Free Security Stuff Worth It? Complete Package Recommended Here Is!

Free Security Stuff Worth It? Complete Package Recommended Here Is!

NOTE: I am/was Webmaster of the BlueCollarPC .net/.org/.us [all retired] now at permanent BlueCollarPC Security Helper Google Site
Since 2005 we have been graced to help over 12 Million User/Visitors and have maintained honest free best information sharing with integrity expected by the Community at such Help Sites across the web, as expected and demanded. For continual help and information ongoing, stop into our site anytime and even find more stuff to use ! HOME:

You wanted a free package, here you go. A Good Free Package of Security Softwares you can add FREE FREE FREE!


You will have to understand what is said here. The reasons over 12 million Users/Visitors of my security site trust it/me is that I have always maintained the honesty of NEVER giving bad advice as unresearched and proven. NEVER posting links that lead to malicious infectious websites. NEVER posted any softwares that were bundled with malware or that were other than “Genuine Freeware” – which is the term I invented as meaning no continual or intermittent pop ups or ads or connected to any ad networks or “nagware” they now call it. Of course it is understood that “trialware” is known that it is a free version for a set time that maybe one week, fifteen or thirty days. I have NEVER promoted any “feel good” false sense and environment of computer security – which many commercial sites do for gain such as online magazines etc. One of our Creeds……

FUD “Fear, Uncertainty and Doubt, a marketing or political strategy” …
FUD (definition)
There are many, many idiots and the corrupt in computer security calling all things FUD (or snake oil – worthless product, does nothing – such as industry wide security products as antivirus, antispyware, personal firewalls etc.) . Some of the count are actual cyber criminals socially engineering you ! Some advocate never using a registry cleaner (which can not pass legal compliance in IT Security) – yet they will advise you to use antivirus and antispyware that does indeed remove malware Windows Registry keys. We as intermediate and advanced users have known for years and have used for years Registry products that are an invaluable help to manually locate malware items and as well identify reported malware by security products (antivirus. antimalware, firewalls). These others are telling you ‘feel-good’ false security lies as ‘sugar daddies’ or ease-of-use ‘candy man’ tactics to be your “security guru” at many forums. We do not promote any false sense of security or environment. Those wishing to profit from calling security FUD are what we use to call Judas Iscariot and are NOT welcomed here or anywhere there is intelligence. ”

Originally, a “free package” as a handful of security softwares put together as “layers of security” used to be posted by just about all helpers. BUT this was the early days from 2002 on a few. Many products were not near 100 percent protection (antispyware) so it began to then download some extra free versions as stand alone on demand scanners without Real Time Protection activated (but upon purchase). These were added to one you would buy. What one didn’t get – the others would was the logic and advice. You put together your “security solution”.

This dramatically changed forever now and is no longer good advice to any user. The reason is that the cyber crime threatscape changed for the worst years ago. First they added to payloads malwares that would disable ANY free version on the computer. They could not be used. Then they also added malwares that would attack a paid version on the computer as not all antivirus/antispyware products were best quality that repelled easily these attacks upon them to disable them. Weaker or less than quality premium version (pay for) antimalware products (antivirus and antispyware) were successfully attacked and disabled by the newer malware payloads, which then installed at will the rest of their payloads being successful to disable security products – that would be trojans, spyware, rootkits, viruses, etc.

Here is just one example of this as a common threat nowadays (zillions) :
Security software disabler Trojan
Through less than quality firewalls like butter….
Tunneling to circumvent firewall policy
“Users can also use tunneling to “sneak through” a firewall, using a protocol that the firewall would normally block, but “wrapped” inside a protocol that the firewall does not block, such as HTTP. If the firewall policy does not specifically exclude this kind of “wrapping”, this trick can function to get around the intended firewall policy.”

So in good conscience, there is no way to give the older advice of building some free package of security softwares and tell someone they are good to go. It is now plainly a LIE !!! And big BUT…. There are so many that do not have credit cards to buy products online. There are those that simply will not pay for protection like your thrifty Uncle example. So with these – they still need anything as beating a blank. It HAS to be drilled into their heads that a free version is only a scanner with NO protection and the pay product is necessary for Real Time Protection. This is Reactive and Proactive Security. Reactive security is using free scanners like AVG Free etc. with no Real Time Protection and are used AFTER a threat to the PC is perceived by the user. You scan and attempt to detect any threats and remove them. However, the damages are ALREADY done such as a destructive worm or virus and spyware as well, that all files they wished to get have already been copied and sent to the cyber criminals. TOO LATE NOW ! Proactive is using the product with Real Time Protection running 24/7. This BLOCKS infections before they occur – thus NO loss of personal data and/or actual destruction of the operating system or motherboard or chipsets or disk itself leaving the PC “bricked” – like a brick, doesn’t do anything and makes for a paperweight now. (Bricked is generally the term they use for mobiles toasted by malware).

There are just the FEW free products that offer Real Time Protection. If they refuse to pay or can’t, you have to then offer the “free package” and wish them good luck with the instructions to them about dangers. The free ones with Real Time Protection (heuristics) are simply no where near any best product is the problem aside trying to get something for free. You get what you pay for is the advice and of course you explain and add “Best Practices” advice for safe surfing as best possible (stay away from dark side of internet which is full of infections, etc) and not opening or clicking spam emails or attachments etc.

Having all this in mind, and not simply listing a package as my advice without explanation in full above (what I put my hand to), let’s go ahead and put together that free package…..

FIRST the user needs a product with Real Time Protection. This is ALWAYS the first move/installation.
Comodo Free Anti Virus Software Internet Security (Genuine Freeware)
Free Antivirus Software from Comodo eliminates viruses, spyware, and other malware from desktops and networks fighting against Internet security threats. Full Real Time Protection !
PRESS: Great News !
Comodo Internet Security Earns the Prestigious VB100 Virus Certification (press release) April 14, 2011

NEXT: (may be tad advanced for newbie)
Spyware Terminator [Genuine Freeware] (Antispyware and antivirus. Real time protection added!)
Millions of users worldwide rely on Spyware Terminator, winner of many awards and high ratings from industry experts and users. Its free comprehensive protection is comparable to competitors’ paid versions! Originally with enterprise level Clam Antivirus now has F-Prot Antivirus.
Spyware Terminator includes:
* Fast spyware scanning
* 100% real-time protection
* HIPS protection
* Antivirus protection
* Multilanguage Support
View List of All Features »

Microsoft Security Essentials…..(only recommended for Real Time Protection and is now very weak product)
Microsoft Security Essentials provides real-time protection for your home PC, antivirus and antispyware real time shields.

SPECIAL NOTE / BASIC SECURITY….Microsoft: Security Essentials is designed to be bottom of the antivirus rankings. Microsoft has admitted Windows users should install antivirus above and beyond its own Security Essentials, describing its protection as merely a “baseline” that will “always be on the bottom” of antivirus software rankings.

HOWEVER it must be explained…. Generally, Do not use two antimalware products that have real time protection technology. These generally will conflict and worst. You can use these with free stand alone products that just scan, safely. DO NOT INSTALL ALL THREE OUT OF PARANOIA!!!! Pick one only that has Real Time Protection. These are that Proactive Defense.

BEST FREE STAND ALONE SCANNER – SCAN ON DEMAND (means open it and click scan)…..
Emsisoft Antimalware
Full antivirus and antispyware combined. This is the best premium product in the world IMO (In My Opinion) beating all others as Norton, ESET NOD32, Sophos etc. Download it and choose either full version free for 30 days to try, or simply click Free Version (without Real Time Protection). With one of the above Real Time Protection products, you can then use the Emsisoft free version to perform a full scan at least once a week. Heavy surfers – scan every or every other day! Great scan options, you can do the quick scan check for malware running right now on the PC (think you may got hit at a site) which takes only a moment. You can choose Smart Scan which checks the usual suspects in the usual places. And then Full Scan which will scan the entire computer system and files. This takes over a half hour with any product, the full scan, but should be done even by advanced users at least once a week or bi-monthly.

Emsisoft Emergency Kit 2.0 [genuine freeware, best, recommended]
Your emergency kit for infected PCs! Detects and removes Malware > 5 million known dangers. World class dual-scan-engine. 100% portable – perfect for USB sticks. HiJackFree and BlitzBlank included. Self made Emergency USB Drive stick (or purchase) – Expand the content of the Emsisoft Emergency Kit to an USB stick and make your own universal tool to scan and clean infected PCs.


Avast AntiVirus Home Edition [working-freeware]
Free avast! 4 Home Edition. avast! 4 Home Edition is a full-featured antivirus package designed exclusively for home users and non-commercial use.

BitDefender Free Edition
BitDefender Free Edition is an on-demand virus scanner, which is best used in a system recovery or forensics role. If you are on an “always-on” Internet connection, we strongly advise you to consider using a more complex antivirus solution.–BitDefender-Free-Edition.html

AVG – Free Antivirus
AVG Anti-Virus Free is virus and anti-spyware available for free.


SUPERAntiSpyware [working-freeware version]
SUPERAntiSpyware scans your computer for known Spyware, Adware, Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers and many other types of threats, and allows you to remove or quarantine them. The free version lacks real-time blocking and protection as well as several other advanced options.

Lavasoft Ad-Aware [working-freeware version]
Ad-Aware Personal provides advanced protection from known data-mining, aggressive advertising, Trojans, dialers, malware, browser hijackers, and tracking components. This software is downloadable free of charge for personal use. (Lavasoft Ad-Aware is one of the pioneers in antispyware as we know it today along with Webroot Spysweeper)

Malwarebytes [working-freeware version]
Free anti-malware (Has become popular, detection rates have greatly improved ! )

INSTALL QUALITY FIREWALL ASAP! (Microsoft includes a basic firewall now in all editions)
ZoneAlarm Free Firewall (BEST FREE – SET AND FORGET!]
Protect your PC with #1 Free Firewall

Comodo Personal Firewall [tad advanced for newbies]
(Genuine Freeware, and rated by international tests as about world’s best – now includes antivirus real time)

***Now there is a free security solution with even more to add, below a couple more tools. You get antimalware with Real Time Protection installed for real time protection and then add the free scanner versions to get what that misses – both antivirus and antispyware. With the free scanners, you can download/install all of themwill not conflict with the Real Time Protection product (Comodo etc) installed.


Internet Tracks Cleaners Recommended (Privacy and Security)
CCleaner – Wikipedia, the free encyclopedia (very popular, safe, freeware/donate)
CCleaner supports the cleaning of temporary and unneeded files from certain …
[You should have browsers Settings to delete all internet history each time it closes. Do NOT keep cookies on your computer at all. They have been broken into by crimewares now. Cookies should only be given session cookies permissions as a privacy and security issue (cookies have been broken into by malwares) and only if necessary.

Secunia Personal Software Inspector (PSI) [MILLIONS OF DOWNLOADS]
The Secunia PSI is a free security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Set to automatic or manual Update for all, will not install the purchase Upgrade versions – just Updates released by the software companies.

ESET (NOD32) Stand-alone malware removal tools

BetterPrivacy :: Add-ons for Firefox
Remove or manage a new and uncommon kind of cookies, better known as LSO’s.The BetterPrivacy safeguard offers various ways to handle Flash-cookies set by Google, YouTube, Ebay and others… Go through Settings and click to always delete all when browser closes or paranoid – check to give permission to these on case to case basis.

EULAlyzer 1.1 [freeware]
EULAlyzer can analyze license agreements in seconds, and provide a detailed listing of potentially interesting words and phrases. Discover if the software you’re about to install displays pop-up ads, transmits personally identifiable information, uses unique identifiers to track you, or much much more.

Microsoft Malware Prevention troubleshooter
The Microsoft Malware Prevention trouble shooter is designed to scan your computer and make recommended changes based on your current settings to provide you with the most up to date security for your Windows operating system. Building up your computer’s defenses helps secure your computer against viruses and other malicious software.

The Microsoft Malware Prevention troubleshooter does the following:
•Turns on your Windows Firewall. Enabling your Windows Firewall will protect your computer by blocking communication to your PC that may be malicious software.
•Antivirus software: Checks your Antivirus protection status. You will be prompted to update your Antivirus program if it is not up to date or enable Real-time protection. If you don’t have an anti-virus program installed it will offer you to use Microsoft Security Essentials or learn more about other security software partners.
•Turns on Automatic Update. Windows Update helps keep your PC current, secure and enhance performance by automatically downloading and installing the latest security and feature updates from Microsoft. This helps ensure that both Important and Recommended updates are downloaded.
•Pop-blocker: Enabling Pop-up Blocker will make browsing the web safer by helping prevent malicious or unsafe pop-ups from automatically appearing.
•Remote Registry: The Windows Remote Registry service enables remote users to modify registry settings on this computer. If this service is stopped the registry can be modified only by users on this computer as opposed to over the network.
•Internet Explorer: The package will inform you if you have the latest version of Internet Explorer installed. It will also modify your current privacy settings to ensure you have a safe browsing experience. The package will delete your internet cache and browsing history, which will help protect against malicious threats attempting to access your computer while you’re online.
•Enables User Account Control (UAC). User Account Control (UAC) will prevent malicious software from modifying your computer settings without your consent.
•Proxy Settings: If malicious software has modified your Internet Proxy settings, therefore making it difficult to get online, the package will reset your settings so you can browse the internet normally.


ProcessQuickLink [Genuine Freeware]
For your PC to function Windows needs to run and manage many different processes. While many processes run by Windows are essential and legitimate, most PCs get bogged down with processes that are useless or downright harmful. ProcessQuickLink gives you an easy way to analyze each process running on your PC. Is it a resource hog? Could it be part of a virus infection? Or maybe a sign of spyware? ProcessQuickLink will give you the answer. How it works….. Once you install ProcessQuickLink access the Task Manager. Near each process you will see an button. Click on the button and you will be linked to the process page as listed on

HiJackFree (freeware)
Freeware! HiJackFree helps advanced users to detect and remove Malware manually. With HiJackFree you can manage all active processes, services, drivers, autoruns, open ports, hosts file entries and many more. For your full control over your system.

PowerTools Lite – The Freeware Registry and System Cleaner
PowerTools Lite 2011 is a freeware edition of jv16 PowerTools – the ultimate Windows optimization and tuneup utility suite. PowerTools Lite 2011 allows you to easily clean up your computer from unneeded data, unused temp files, registry left overs and automatically fix registry errors.
NOTE: jv16 PowerTools has been about the best registry cleaner loaded with extra advanced features including registry editor for years and years since the beginning. Recently over a year ago they released the above free edition which has four levels of intensity clean for beginner to advanced. Very safe. Very trusted .
PREMIUM jv16 PowerTools:

Belarc Advisor (Freeware)
The Belarc Advisor builds a detailed profile of your installed software and hardware, missing Microsoft hotfixes, anti-virus status, …
Belarc, located in Maynard, MA, develops and licenses Internet based products which help make personal computers easier to use and maintain by large enterprises, small businesses and individual consumers. Our products are used for software license compliance, hardware upgrade planning, cyber security status, information assurance audits, IT asset management, configuration management, and more. Belarc’s products are in use on well over twenty million computers and are licensed by numerous customers including: AIG, Dana, Kindred Healthcare, NASA, National Park Service, U.S. Air Force, U.S. Army, U.S. Census Bureau, U.S. Coast Guard, U.S. Marine Corps, U.S. Navy, Unilever, WebMD/Emdeon, and many more.

Trend Micro RUBotted (free)
Malicious software called Bots can secretly take control of computers and make them participate in networks called “Botnets.” These networks can harness massive computing power and Internet bandwidth to relay spam, attack web servers, infect more computers, and perform other illicit activities.
Security experts believe that millions of computers have already joined Botnets without the knowledge of their owners. By using remotely-controlled computers, the criminals in charge of the Botnets try to remain anonymous and elude authorities seeking to prosecute them. RUBotted monitors your computer for suspicious activities and regularly checks with an online service to identify behavior associated with Bots. Upon discovering a potential infection, RUBotted prompts you to scan and clean your computer.

Reading Blue Screen of Death Codes
Generally IRQL errors are hardware or driver related. We’d suggest
checking to see if any drivers have been updated recently and either
roll them back to the old driver or see if an even newer driver is
available (the vendor may have released a driver to fix the crashes). If
that doesn’t help you’ll find BlueScreenView, a crash dump analyzer,
rather helpful. We have a guide to using BlueScreenView to help get you
BlueScreenView v1.40 – View BSOD (blue screen) crash information stored in dump files.
Copyright (c) 2009 – 2011 Nir Sofer

GO PORTABLE! PUT TOGETHER PORTABLE SECURITY PACKAGE! I really recommend you install this for the USB Drive and then add the portable versions below….
GET: software for USB Drive…. (has all kinds of portable apps listed you can install at will, plus you can check to get updates from each app (security updates, bug fix, etc) automatically or manually….
Provides packaged software suitable for use on portable media, without leaving settings files on the host computer. Includes developer information, discussion …

Try clean up with portable products when access/download blocked or getting dreaded Blue Screen Of Death……

How to Remove Boot Block Malware
Boot block malware is malicious software that settles into your computer’s hard
drive in the first sector and replaces the boot block instructions with malware
instructions. When you start, or boot up, your computer, the malware is loaded
into your computer’s memory and from there it can spread to any other part of
your computer. ….


Emsisoft Emergency Kit 2.0 [genuine freeware, best, recommended]
Your emergency kit for infected PCs! Detects and removes Malware > 5 million known dangers. World class dual-scan-engine. 100% portable – perfect for USB sticks. HiJackFree and BlitzBlank included.
Emsisoft BlitzBlank
BlitzBlank is a tool for experienced users and all those who must deal with Malware on a daily basis. Malware infections are not always easy to clean up. These days the software pests use clever techniques to protect themselves from being deleted. In more and more cases it is almost impossible to delete a Malware file while Windows is running. BlitzBlank deletes files, registry entries and drivers at boot time before Windows and all other programs are loaded.
Self made Emergency USB stick – Expand the content of the Emsisoft Emergency Kit to an USB stick and make your own universal tool to scan and clean infected PCs.

Microsoft Standalone System Sweeper (Beta) [FREE]
NOW CALLED Windows Defender Offline
Microsoft ships free malware cleaner that boots from CD or USB
ZDNet (blog)
June 1, 2011, 10:15am PDT In a move aimed at cutting down on support call costs, Microsoft has released a malware recovery tool that boots from a CD or USB stick. Ryan Naraine is a journalist and social media enthusiast specializing …

Windows Defender Offline Beta
(Free from Microsoft, Scan with Windows Defender Offline Betafrom CD/DVD or USB Drive at Start Up to remove blocking malwares)

What is Windows Defender Offline Beta?
Windows Defender Offline Beta: frequently asked questions
How to Create a Bootable Offline Version of Windows Defender

We should point out that you can also scan your PC with a
BitDefender boot disk
Kapersky boot disk
Avira boot disk
or even an Ubuntu Live CD,
this is one more tool to add into your toolkit.

ClamWin Portable (Antivirus, more) [FREE]
Antivirus to go…. ClamWin Portable is the popular ClamWin antivirus packaged as a portable app, so you can take your antivirus with you to scan files on the go. You can place it on your USB flash drive, iPod, portable hard drive or a CD and use it on any computer, without leaving any personal information behind.
NEWS: ClamWin Portable 0.97.1 (anti-virus) Released | …
ClamWin Portable 0.97.1 (anti-virus) Released. Submitted by John T. Haller on June 17, 2011 – 7:46pm. logo ClamWin Portable 0.97.1 has been released. …

SUPERAntiSpyware Portable Scanner (Antispyware) [FREE]
Follow the instructions below to download the SUPERAntiSpyware Portable Scanner. The scanner features our complete scanning and removal engine and will detect AND remove over 1,000,000 spyware/malware infections. The scanner does NOT install anything on your Start Menu or Program Files and does NOT need to be uninstalled. The scanner contains the latest definitions so you DO NOT need Internet Access on the infected system to scan.

Comodo Cleaning Essentials
Comodo Cleaning Essentials is a set of portable antivirus tools
that will help you to detect and remove malware from an infected PC.

ESET SysInspector is a powerful, portable security tool that will inspect your system’s files, running processes, Registry keys and more, looking for and highlighting anything that could be a sign of malware.
(Makers of famous Eset NOD32 Antivirus – most awarded in history)

Norman Malware Cleaner is an interesting portable antivirus tool which will scan your PC, detecting and removing any malware that it uncovers.

The AVG Rescue CD is a portable environment that comes with a range of tools to help you clean up a virus-infected PC, fix hard drive problems, and get an unbootable system working again. This variant of the rescue CD is intended for installation on a USB flash drive. After downloading, you should extract the archive contents directly to the root folder of the USB drive you’d like to use. (If you don’t have a tool that can read RAR files, then try 7-ZIP).

CCleaner Portable
CCleaner Portable is a compact version of CCleaner that you can store on a CD, USB flash drive, microSD, or even two floppy disks if you still use those.

Emsisoft Emergency USB Stick (Antivirus + Antispyware) [BUY] (USB Drive / Installed)
Emsisoft Anti-Malware Personal Edition. Malware, adware and spyware removal and scanning. Plug in an run – It is that easy to clean an infected computer with the Emsisoft Emergency USB Stick!
How it works: The Emsisoft Emergency USB Stick contains two useful programs which can be used to scan and clean an infected computer
quickly without a required software installation

How to Make a Bootable Antivirus Cd
How to Make a Bootable Antivirus Disc This document will teach you how to make a bootable anti-malware ( bootable antivirus ) cd/dvd step-by-step. … This is the best free way to remove any piece of malware with a 100% success rate. Steps: … Get Free Ultimate Boot CD

ONLINE HELP 24/7 BlueCollarPC Security Helper Website:

SENDER: gerald309 —
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
Membership/Join List:
Free Malware Removal Help / A Community Website Since 2005

Original Web 2.0 Dangers, malware in images

Original Web 2.0 Dangers, malware in images

Web 2.0 is the phrase that more or less was describing the new interactive type sites coming online, such as Facebook today, and what is now called Social Engineering. It also referred to new types of display type add-ons to websites. It is describing innovation in some vein to new designs, applications on websites. Flash format is included. Microsoft Silverlite became these type new ways or innovation of display as more clarity even in graphics. One fairly visible item on many websites now are Tag Clouds, which are all the key words a website uses referring to the content in the site to help search engines and visitors and are displayed in a cloud of search/tag key words.

Perhaps even PHP format can be included 

NOTE that quality antimalware (antivirus+antispyware) with Real Time Protection (or HIPS) activated protects against these – keep it updated and running 24/7!

Most on the Net of newer users just ran with Web 2.0 meant the new social interfacing applications like a bunch of chatty-cathys/charlies completely dismissing security concerns and actual malware now surfacing in newer website add-ons, embedded, etc. They will say Web 2.0 Dangers has nothing to do with malware out of ignorance, or playing ostrich, or duping the public with dumb pills intentionally as malicious trolls and cyber criminal gum shoes do at places – intentional misinformation to make you their mark. The malware infection in these add ons pretty much resulted in drive-by infection – simply visiting the website with the malware embedded, and unseen, infecting the PC right over the Net.

Basically and bottom line is that in recent years there has been quite the changes with more graphical format and embedded and add ons on websites and the term security-wise as  Web 2.0 Dangers here generally applies to drive-by infection at a website (intentionally or hacked) as opposed to infection through email attachemnts or bad software downloads laced with malware and being duped into clicking some bad link online etc etc etc.

Newer rare event as part of Web 2.0 Dangers is actually getting infected while playing a movie online in an embedded player – embedded malware encoded in the movie infects the PC.
How to Fix a Flash Virus |

How Movie Files Can Become The Source Of Malware Attacks
Lifehacker Australia
Apple’s latest security update for Mac OS X includes a series of patches to Quicktime designed to stop the movie playback software from being exploited to launch a malicious attack…..

An actual real, amatuer forensics I performed for a friend infected this way
Forensics: “Unknown Flash Movie Virus”
By bluecollarpc – Last updated: Tuesday, May 7, 2013

I saw this new article (below) and realized immediately what has been discovered. Below is a copy of the post to our Help and Alerts Group…
Web 2.0 Danger Discovery – Malware hid in image exif metadata     
Posted By: bluecollarpc
Thu Jul 25, 2013 11:39
Malware hid in image exif metadata
SC Magazine Australia
Sucuri researcher Peter Gramantik found the compromised but working images on a small number of sites. He said attackers had preserved the image by storing malware within the image exif metadata, which contained time and geo location information.,malware-hid-in-image-exif-metadata.aspx

BlueCollarPC.US Writes;
THIS mentioned….
New virus first to infect Macromedia Flash (January 8, 2002)
IS ACTUALLY one of first in WEB 2.0 DANGERS concerning embedded add on
media in websites. The malware dangers of these are generally not added
or spoken about in general Web 2.0 conversations BUT are that
security-wise intregal part of WEB 2.0 DANGERS as a coined phrase that
generally now calls to mind Social Engineering etc. as concerning
interactive applications online as Facebook. The abscense of malware in
Web 2.0 Dangers is generally due to the ignorance or playing ostrich of
the speaker.

Web 2.0 – Wikipedia, the free encyclopedia
The term “Web 2.0” refers to a perceived second generation of web
development and design, that aims to facilitate communication, secure
information sharing, …


Network Forensics
What does it mean?
Network forensics refers to investigations that obtain and analyze
information about a network or network events. It is a specialized
category within the more general field of digital forensics, which
applies to all kinds of IT data investigations. Typically, the phrase
network forensics refers to the specific network analysis that follows
security attacks or other types of cybercrimes.

In an Amatuer Forensics I performed, several years ago now as a classic, I had discovered an apparent plasma text virus embedded in a .Gif Image. The full payload was a full blown botnet infection of the Windows XP Desktop….
NON Sample –

— SENDER: gerald309
Webmaster: Malware Removal/Amateur Forensics
Membership/Join List:
Free Malware Removal Help / A Community Website Since 2005

Forensics: “Unknown Flash Movie Virus”


Forensics: “Unknown Flash Movie Virus”

For a friend….

ESTIMATE: Embedded Flash Movie Malware Payload
NOTE: Possible Network Attack Associated – Botnet/Botmaster
SEE: Common Types of Network Attacks – TechNet – Microsoft
(According to payload that executed, spoofed PC Identity apparent, unsuccessful)

DEVICE: Windows Vista HP (Home Premium) SP2 (Service Pack 2, Fully Patched) / IE9 (Internet Explorer Version 9) – on Home Network / Microsoft Security Essentials installed/running.

Viewing Flash Movie in embedded webpage player. Best description from user was sudden turbulence of browser and disconnection and system crashings and then the WGA (Windows Genuine Advantage) panel pop up on restart identifying PC as an illegitimate copy of Windows was running. Connectivity was not further possible.

A full payload forensics was suspended citing any in-the-wild attack or proof-of-concept – and is not being posted publicly. Operating System was reinstalled to Factory Fresh – wiping the disk – now fully patched to current operation.
HISTORY: New virus first to infect Macromedia Flash (January 8, 2002)

Apparently malware payload (not just a virus) executed on Windows Vista HP SP2 / IE9 while viewing flash movie in an embedded player at website. This was the only affected computer on a Home Network with other computers unaffected. Other peripherals and router were not affected. This may constitute as specific targeting of the IP via Network Attack. It seems possible a botnet infection was unsuccessful as connectivity was destroyed, yet the operating system was spoofed and identified as now a pirated copy of Windows via WGA technologies apparently. There were no ransomware activities observed …thus the spoofing of the Windows OS (operating system) itself as now a pirate copy indicates the WGA notification window/panel was valid and not a fake shell as some ransomware scam. Note it is possible it was simply a targeted payload to simply destroy the system from further use as the intended malware malicious intent.

Apparent multi-malware payload executed through infected flash movie possibly originating from Apple/Mac computer as possibly an iFrame Movie.

iFrame (video format)

Universally and historically Apple/Mac users are in ‘caveman’ days as not using antimalware. Recently things have changed, as infections have increased dramatically in infancy for this operating system. Linux even more so, their users are now told it is “polite” to use antivirus to protect uploading or exchanging any Windows infecting files from a Linux computer that do not affect Linux – but will infect Windows PCs. Newer Community guidelines. Years ago…..

Microsoft JPEG Vulnerability and the Six New Content Security Requirements,39024759,60129423p-39000575q,00.htm
In November 2004, a critical Microsoft security vulnerability (MS04-028) was discovered which could allow attackers to embed malicious code inside JPEG image files. Until that time, JPEG image files were considered immune to attack. To effectively deal with this vulnerability, security and IT professionals need to incorporate six new and critical content security requirements into their networks.

… that this is the idea with an infected flash movie. Simply visiting a website with the infected picture (JPEG) would infect the unprotected PC. Same with infected flash files is apparent here as source of infection.

NOTE…. Was a novice user and is believed there were possible additional clicks not mentioned possible that caused the malware payload execution.

With a multi-malware payload as opposed to just a virus, the operating system was reinstalled / restored to Factory Fresh condition – wiping the disk first of all data. A much higher quality paid subscription antimalware product was installed and absolutely recommended! Note that Microsoft Security Essentials was the installed and active protection on the PC…. HOWEVER:

Is Microsoft Security Essentials adequate protection?
Review: Microsoft Security Essentials
Microsoft Security Essentials bombs AV-TEST, loses certification
Microsoft Security Essentials Fails Tests, Loses Antivirus Certificate
Microsoft Security Essentials fails AV-TEST again
Microsoft fights back on antivirus certification fail, claims malware tests …


How to Fix a Flash Virus |

Adobe Flash

SWF (ShockWave Flash)

What Is a Flash Cookie?

Can Flash Extensions Be Harmful?

How to Check & Uninstall Flash Cookies

How to Clear Macromedia Flash Shared Objects

Website Storage Settings panel

Visit the Adobe Flash Player Settings Manager

It is recommended to be aggressive here and deny all actually, especially noting that nefarious hackers break into microphones and webcams to spy. If having trouble after choosing to block all from being stored on computer go back and make adjustments. Any ‘faster’ use of allowing storage is antiquated and ancient as pertaining to 56K Dial Up years and years ago – as the vast majority have switched to broadband/dsl where available – not quite everywhere though (rural etc).


The BlueCollarPC.US (and former domain extensions) has always been a free Community Help Site and here is a mock severe billing if able to work from an official PC Repair Shop…… LOL



# Bench Charge………………….$75.00

# Forensics Basic / Suspended…….$25.00
(Normally $150.00 with full reporting)

# Reinstall Factory Fresh Windows…$50.00
…Discounted !

# Fully Patched and Reinstalled
softwares, 18 hours (Vista SP2)….$100.00

TOTAL ……..$250.00

Welcome all, archived blog installed

Welcome all, archived blog installed….. We have imported our archived blog posts from our original BlueCollarPC @ WordPress security blog. This is located at

We will keep the free version and continue to post to it, as has been linked for years. I am the original webmaster of the BlueCollarPC .Net and .Org and lastly .US . The BlueCollarPC .Net originally began about year 2005 as a help and information site dealing with spyware as main course. There were many video help tutorials for download in several formats. This became a huge site trafficking about 2,700 to 3,000 Visitors monthly, and tolled in at just over 6 million by 2009. Those kinds of numbers are usually seen at small business sites, but I had just a simple personal website !

Being able to help that many people who found our site as a primary or a main additional site for help and instruction in PC security and malware removal outweighed any personal pride or egotism in hits counters. That is what it was launched for, genuine informed help – not a personality contest. It was humbling to see those kinds of numbers though.

Push come to shove, our site was attacked and there were several behind the scenes personal attacks against myself and equipment – attempts at destroying computers and mobile computer. These attacks were sophisticated dreaded botnet payload attacks and another as attempting circumventing Vista technology and destruction. So, my site theme being “BlueCollarPC” as a spyware removal  site originally, now was upgraded to a full blown malware removal help and instruction site – all malware with heavy concentration into botnet detection and removal and restoration of damaged systems and I graduated through this all into Amateur Forensics (Computer Forensics). What did not kill us makes us stronger, and so it goes. All but the BlueCollarPC .US were closed with this new full malware removal site including information and help against all malware now as viruses, worms, trojans, rootkits, adware, spyware, botnets and bootkits. etc etc etc.

At the end of the decade (2000 to 2010) and into the new one, things seemed to be a ghost town at many help destinations as groups, forums, and lists, others. It seemed the whole “XP Generation” of  the “XP Years” (Windows XP) had graduated and learned it all or enough to carry them through. Of course I invested into a Vista PC which was the actual crown jewel of the decade in security software – unprecedented as an operating system itself being the best security software available. To this day Windows Users are unaware that viruses could not run on Vista and neither the dreaded rootkit malware. UAC User Account Control was just one of these new security technologies in Vista. First hand, no lie, two or three times I saw a virus execute to install on my Vista (drive by hit – bad website, tried to install scareware fake antivirus programs). Sure enough and word for word from Microsoft – “viruses are not able to write to the disk in Vista”. They the payloads were in Temporary Internet Files. All I had to do was close the browser with the settings I had clicked to “Delete All Temporary Internet Files” etc. I also use and ran CCleaner offering a little more clean up. That was it. The virus was gone ! I then scanned with high quality antimalware to prove it. Zero infection. The point  was, or joke, you did not even need antivirus with Vista – like “you’re kidding, you actually purchased antivirus for Vista ? What for ? ” Seeing is believing.

Windows 7 was the first time in history an operating system (Windows, Linux, Apple/Mac etc) was actually downgraded security wise. Users screamed about UAC. The security world kind of went with – what idiots, sorry to say. This did not make sense. It did not make sense worst, that Microsoft themselves accomadated them. LOL. You get what you pay for. They seemed to love no intrusion whatsoever on having a good time on the Net – utterly regardless of the dangers. It was like handing drunk teenagers the keys to the sports car. We all know how that ended. Many never made it home.

Enter Windows 8 with the new anti-rootkit / anti-bootkit technologies – the ‘secure boot’ Windows 8. Windows 8 is a gigantic leap forward from XP as blocking rootkits/bootkits from running before antimalware programs are able to boot to begin detecting malware attempting to run in the session. With XP, we all know if a rootkit was suspected it meant reinstalling Windows as the ONLY cure. The trouble was most anti-rootkit softwares were crap at detecting them and even worst at attempting to remove them. Enter Windows 8 new security technologies. THOSE DAYS are over with forever. Just before Windows 8 hit the streets there was hint at they could crack this. But as well there is new anti-malware softwares that can “cold boot” to detect this. Somewhat as being able to scan the system without even starting the computer and as it does start up. Bye bye, covered anyway.

Well back to re-launching BlueCollarPC.US – now in the WordPress format rather than the traditional website. Kind of all in one – blog and content, links. Spread the word – “We are back !” (StarTrekkies – Romulans and Enterprise Captain Picard in the Neutral Zone Confontation over Borg encroachments).

From our alternate back up website at

Welcome to the BlueCollarPC Security Helper!
SPECIAL NOTE: Our Main Domain BlueCollarPC.US is being closed June 2012.
For the record….. I began the BlueCollarPC Computing Security Community Website in 2005 at the original .Net website. I believe at that time, the .Com website was actually a PC Repair Shop which I was not connected with. Towards the end of 2009, the BlueCollarPC .Net created by me had enjoyed just over 6 Million Vistors/Users! – are proud to have been a part of it all and indeed actually had “discovery” in the security industry concerning the malware RASautodial registry entries discovered by Yours Truly. Never be afraid to ‘take a look under the hood’ of your PC ! You never know what you’ll find.

Catch Up With Java Malware Information

Catch Up With Java Malware Information….. Day after day seemingly, week after week, for about 100 days or more it seems cyber crime has declared war on Java a handful of ‘zero days’ as well have been suffered. For security reasons it has been actually advised to disable Java in ALL browsers and even uninstall Java from the computer. This has been no joke if you have not been keeping up with all the security warnings and actual INFECTIONS occurring via exploiting Java ! READ ON TO CATCH UP IF YOU MUST ! ! ! FOLLOW THE TIMELINE TO DATE….


 Aug 29, 2012

US-CERT Alert – Oracle Java 7 Security Manager Bypass Vulnerability
Fw: US-CERT Alert TA12-240A – Oracle Java 7 Security Manager Bypass Vulnerability…System US-CERT Alert TA12-240A Oracle Java 7 Security Manager Bypass Vulnerability…Yet * Let’s start the week with a new Java 0-day in Meta…..

Critical Java 0-day flaw exploited in the wild
Critical Java 0-day flaw exploited in the wild Posted on Aug 27, 2012 06:11 pm Researchers…security firm FireEye have discovered targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims…

Aug 30, 2012

Unpatched Java exploit spreads like wildfire
Unpatched Java exploit spreads like wildfire Naked Security Sophos customers are proactively protected against the malware payload as Troj/Agent-XNE and the malicious Java applet as Mal/JavaKnE-H. Sophos endpoint customers using our web protection…

Java 7 Under Attack: Researchers Advise It Be Disabled During The Interim
Java 7 Under Attack: Researchers Advise It Be Disabled During The Interim CRN…thereof. “IT administrators’ only defense at the moment is to limit the use to Java,” wrote Wolfgang …

Disable Java NOW, users told, as 0-day exploit hits

Disable Java NOW, users told, as 0-day
exploit hits web Register The vulnerability allows…keylogger or some other
type of malware . The payload does not need to be a Java app itself. In
the form in which it …

Java 0-day exploit added to Blackhole kit, still no news
about patch

Java 0-day exploit added to Blackhole kit,
still no news about patch Posted on Aug 29, 2012 12:20 pm The recently
discovered Java zero-day flaw that has been spotted being used in limited
targeted attacks in…

Aug 31, 2012

Zero-day Java flaw exploited in targeted tax email malware attack
Zero-day Java flaw exploited in targeted tax email malware attack by Paul Baccas on August…cybercriminals have taken advantage of the critical zero-day flaw vulnerability in Java, sending out malicious emails which pretend to come from an accountancy firm…

Java Zero-Day Malware Attack: 6

Java Zero-Day Malware Attack: 6 Facts
InformationWeek Businesses are growing worried about drive-by infections by
malware that exploits two zero-day Java vulnerabilities. Attackers,
apparently operating from China, chained the two…

Java is Insecure and Awful, It’s Time to Disable It, and
Here’s How

Java is Insecure and Awful, It’s Time to
Disable It, and Here’s How As usual, there’s yet another security hole in the
Java Runtime Environment, and if you don’t disable your Java
plugin, you’re at risk for being infected with malware. Here…

Sep 1, 2012

Java 0-day exploit served from over 100 sites
Java 0-day exploit served from over 100 sites Posted on Aug 30, 2012 03:23 pm The problem of the two unpatched Java zero-day vulnerabilities that are actively exploited in the wild by attackers…

US-CERT Releases Oracle Java JRE 1.7 Security Advisory
Fw: US-CERT Current Activity – US-CERT Releases Oracle Java JRE 1.7 Security Advisory —–Original Message—– From…Awareness System US-CERT Current Activity US-CERT Releases Oracle Java JRE 1.7 Security Advisory Original release date: Tuesday…

Oracle releases patches for Java vulnerability CVE-2012-4681
hours ago – Oracle has released a new patch which kills off a
in Java 7 that was being exploited by malware developers. “Due
to the high
severity of these …

Encyclopedia entry:
Exploit:Java/CVE-2012-4681.DM – Learn more
hours ago – Summary. This threat is detected by the Microsoft
engine. Technical details are not currently available for this
threat. Top

Unpatched Java Vulnerability Exploited in Targeted
Attacks, Researchers Say

Unpatched Java Vulnerability Exploited in
Targeted Attacks, Researchers Say PCWorld (blog…has been … 

Oracle fixes Java 7 web browser flaw
Oracle fixes Java 7 web browser flaw IT PRO Software giant Oracle has finally released a patch…malware . The US government warned end users to be on their guard against Java 7 zero-day vulnerabilities … 

Oracle provides early patch for

Oracle provides early patch for Java iTWire
The next Java update was scheduled for October 16…also includes fixes
for two other vulnerabilities affecting Java running …

Update Java in Control Panel ! Oracle releases security
patch for Java vulnerability

Oracle releases security patch for
Java vulnerability Before now, the only way to
protect computers from potential malware attacks exploiting this…

Sep 3, 2012

Oracle patches Java 0-day, researchers say there is
another one

Oracle patches Java 0-day, researchers say
there is another one Posted on Aug 31, 2012 02:09 pm Oracle has finally issued
an update for Java 7 (v 1.7.0_07) which solves the problem of the
CVE-2012-4681 vulnerability…

After patch, researchers find another Java vulnerability
After patch, researchers find another Java vulnerability SC Magazine Australia Hours after the company that maintains…

Oh No Not Again! New Java Vulnerability Uncovered In
Latest Java Update

Oh No Not Again! New Vulnerability Uncovered In
Latest Java Update Forbes Adam Gowdiak, CEO and founder of Security
Explorations, has…

Sep 5, 2012

Fake Amazon emails open the way for

Fake Amazon emails open the way for malware Posted
on Sep 04, 2012 01:15 pm The CVE-2012-4681 Java zero-day vulnerability
might have been patched, but because it was added to the popular Blackhole
exploit kit and because most…

Fw: Another Java Security Flaw Appears After Oracle Patch
Another Java Security Flaw Appears After Oracle Patch TechWeekEurope…Researchers have uncovered another potentially Java security flaw, which could be used by hackers…Current Activity – US-CERT Releases Oracle Java JRE 1.7 Security Advisory ….

Rogue Microsoft Services Agreement emails lead to latest Java exploit
Rogue Microsoft Services Agreement emails lead to latest Java exploit Computerworld IDG News Service – Hackers are distributing…

Article: Thanks ever so much Java, for that biz-wide
rootkit infection

Thanks ever so much Java, for that biz-wide
rootkit infection Register Shortly after I awoke to…client called to inform me
his computer had contracted some malware . Java has, if you’ll forgive
the anthropomorphization of a bytecode virtualization…

Sep 14, 2012

Oracle confirms existence of another critical Java

Oracle confirms existence of another critical
Java flaw Posted on Sep 11, 2012 03:45 pm When Oracle finally patched the
CVE-2012-4681 Java 0-day that was being actively exploited…

Nov 2, 2012

Jacksbot Java malware can take control of Windows, Mac,
and Linux systems

Jacksbot Java malware can take control of
Windows, Mac, and Linux systems The Next Web…software company Intego
discovered malware which it classified as “a new Java backdoor trojan
called Java/Jacksbot.A.” New threats are discovered all…

Nov 24, 2012

Warning out vs new cross-platform

…vendors warned computer users over the weekend
against a new malware that can potentially affect various platforms that support
Java. In a blog post, Trend Micro pointed out …

Jan 3, 2013

Java server malware targets Windows systems
Java server malware targets Windows systems SC Magazine Researchers have discovered a backdoor delivered by a malicious JavaServer Page (JSP), which targets vulnerable Java-based HTTP servers and allows an attacker to hijack infected systems. The malware…

Jan 12, 2013

New malware exploiting Java 7 in Windows and Unix systems
New malware exploiting Java 7 in Windows and Unix systems CNET The malware has currently been seen…OS X, may be able to do so given OS X is largely similar to Unix and Java is cross-platform. Additionally, the exploit is currently being …

Java flaw poses malware threat to PC users
Java flaw poses malware threat to PC users Financial Times A serious flaw in the Java software found on most personal computers could expose the machines to being…

New Java 0-day exploited in the wild
New Java 0-day exploited in the wild Posted on Jan 10, 2013 04:45 pm A new Java zero-day being exploited in the wild has been found. With the files we were…

Disable Java! Recent 0-day exploit is included in exploit kits
Disable Java! Recent 0-day exploit is included in exploit kits Posted on Jan 11, 2013 06:00 pm The Java zero-day that has recently been spotted being exploited in the wild has turned…

Jan 13, 2013

US-CERT Releases Oracle Java 7 Security

Fw: US-CERT Current Activity – CERT Releases Oracle
Java 7 Security Advisory…Vulnerability Note VU#625617 to address a
vulnerability in Oracle Java Runtime Environment (JRE) 7 and earlier that
is currently…

Jan 15, 2013

Week in review: Java 0-day wreaking havoc, hiding
messages in Skype silences, Apple prevents popular app scam

Week in review: Java 0-day wreaking havoc,
hiding messages in Skype silences, Apple prevents popular app scam tactic Posted
on Jan 14, 2013 06:00 am…

US-CERT – Out-of-Band Patch to Address Java 7
Vulnerability Released

…Current Activity – Oracle Releases Out-of-Band
Patch to Address Java 7 Vulnerability…band patch to address the
recently announced vulnerability in Java Runtime Environment (JRE) 7.
US-CERT encourages users and…

Security: Homeland Security Warns About Java

Homeland Security Warns About Java Malware Live A newly-discovered vulnerability

How To disable Java in my web

How do I disable Java in my web browser?…Macintosh OS X
•Browser(s): Internet Explorer, Firefox, Chrome, Safari •Java version(s):
7.0, 7u10+ FULL INSTRUCTIONS (easy) …..

Jan 16, 2013

Oracle patches critical 0-day with new Java

Oracle patches critical 0-day with new Java
update Posted on Jan 14, 2013 01:05 pm Oracle has released Java 7 Update
11, the computing platform’s newest version that patches…

Oracle delivers 86 security

…fixes Posted on Jan 16, 2013 10:06 am Oracle has
had two major updates in the last 2 days. On Sunday, Jan. 13 a new version of
Java 7 was released that addresses the 0-day vulnerability that has been
exploited in the wild. The Oracle C…

Surprised? Old Java exploit helped spread Red October

Surprised? Old Java exploit helped spread Red October spyware Register Unpatched Java installations…October on
Monday, …

Malware masquerades as patch for

Malware masquerades as patch for Java Hackers often disguise their malware as a legitimate…

Jan 21, 2013

Java Security ‘Fix’ Is Disguised Malware

Java Security ‘Fix’ Is Disguised Malware
Attack InformationWeek The malware may be…against browsers. The attack begins
with a Web page warning that a newer version of Java is required to …

Newest Java update doesn’t fix fresh critical

Newest Java update doesn’t fix fresh
critical vulnerabilities Posted on Jan 21, 2013 03:26 pm Another week, another
zero-day threatening millions of Java users. As you might remember, last
week Oracle released Java 7 Update 11, which…

Jan 28, 2013

Beware of fake Java

Beware of fake Java updates CNET January 22,
2013 9:30 AM PST. Following recent security vulnerabili…vulnerabilities in
Java, malware developers are taking a new approach to exploit the
Java platform by issuing false updates that pose as legitimate updates
for the…

Java’s new “very high” security mode can’t protect you
from malware

Java‘s new “very high” security mode can’t
protect you from malware Ars Technica Security researchers have uncovered a
newly discovered bug in Oracle’s Java framework that allows attackers to
bypass important security protections designed…

Feb 2, 2013

US-CERT- Oracle Releases Out-of-Band Patch to Address
Java 7 Vulnerabilities

…Current Activity – Oracle Releases Out-of-Band
Patch to Address Java 7 Vulnerabilities —–Original Message—– From:
Current…out-of-band patch to address multiple vulnerabilities in the
Java Runtime Environment (JRE) 7 Update 11 and earlier. These

Security: Firefox will block by default nearly all

Firefox will block by default nearly all plugins
Posted on Jan 30, 2013 08:08 pm Following the recent debacle of the critical
Java 0-day that was being actively exploited in the wild, in an attempt
to minimize its users’ attack surface Mozilla has enabled “Click…

Feb 6, 2013

Oracle rushes out emergency Java

Oracle rushes out emergency Java patch
Posted on Feb 04, 2013 01:44 pm If you’re still among the users…computer, be
advised that Oracle has released a critical patch update for Java SE
(Java 7 Update 13) on Friday. …

Feb 18, 2013

Facebook disables Java after

Facebook disables Java after hack
VentureBeat The malware came through another issue with Java…Department
of Homeland Security even recommended that people uninstall Java since
hackers were finding new …

Feb 20, 2013

Apple issues malware removal tool today,

…tool today The Verge “Apple has identified
malware which infected a limited number of Mac systems through a vulnerability
in the Java plug-in for browsers,” the company said in its statement.
“The malware was employed in an attack against Apple and other companies…

Apple victim of malware

…malware attack. A small number of systems inside
the company were compromised. The malware attack was tied to a vulnerability in
a Java plug-in for browsers, Apple said in a statement sent via email.
“There is …

Feb 22, 2013

US-CERT Updated Release of the February 2013 Oracle Java
SE Critical Patch Update

…Current Activity – Updated Release of the
February 2013 Oracle Java SE Critical Patch Update —–Original
Message—– From…an updated February 2013 Critical Patch Update for Oracle
Java SE to address a vulnerability. This vulnerability could allow…

Apple Releases Code To Remove Java Hack

Apple Releases Code To Remove Java Hack
Malware Fast Company In the wake of this attack Apple…malware. The Apple hacks
happened when a vulnerability in Java, …

Latest Mac malware attack shows that Windows 8 is more
secure ?

…blog) Apple has admitted that Macs inside the
company were recently victimized by a malware attack. They were hacked in a
drive-by Java exploit. In response, Apple patched the security hole in
older systems vulnerable to the attack, and also released a tool …

Uninstalling the Terrible Ask

…your computer, don’t be ashamed – it could
happen to anybody. Especially considering that is bundled with the equally awful
Java runtime. Those people should be ashamed of themselves. ….

Mar 2, 2013

Java malware sets its sights on your Minecraft

Java malware sets its sights on your
Minecraft passwords Geek This piece of malware is quite a bit more
sophisticated, too. It’s made of multiple Java applets that are hidden
after being dropped onto a compromised system. The tool…

New Java 0-day exploited in ongoing

New Java 0-day exploited in ongoing attacks
Posted on Mar 01, 2013 03:48 pm FireEye has detected yet another Java
zero-day vulnerability being exploited in attacks in the wild. Affected

Recommended Settings and use of CCleaner – Temporary Internet Files Clean Up Browsers, Applications

Recommended Settings and use of CCleaner – Temporary Internet Files Clean Up Browsers, Applications


CCleaner – Wikipedia, the free encyclopedia (very popular, safe,
CCleaner supports the cleaning of temporary and unneeded files from
certain …


BetterPrivacy :: Add-ons for Firefox
Customize Firefox, Thunderbird, and other Mozilla products with
thousands of … Better Privacy serves to protect against not deletable
long term cookies,….
….deletes flash cookies that none others generally delete. Cookies
should only be given session cookies permissions as a privacy and
security issue (cookies have been broken into by malwares) and only if

( CCleaner is for newbies and is indeed a Power User software utility
for the advanced user as well ! )



# Check all for Internet Explorer (ALL ! )

# Recent Documents, Search Autocomplete, Other MRUs
(Do NOT click Network Passwords as no doubt this will keep deleting any
Router type passwords in the system and you will have to keep typing in
the Network Security Key (router password) each use.

# Empty Recycle Bin (IF you are sure you do not need to recover mistaken
deletions here. Be sure or do NOT check and simply open Recycle Bin and
delete manually)
# Clipboard
# TEMPORARY FILES IS SPECIAL….. CCleaner only deletes these after they
Instead you can click this and then DO NOT CLICK RUNCLEANER BUT RATHER
CLICK “ANALYZE” which will not delete anything but scan and present what
is available for deletion. If you see anything under around 100M size of
files you are okay. UNLESS you have the Windows Updates icon in the
bottom tray that says you have Updates to install – THEN anything over
100M size files total present may indicate malware present and has been
running for awhile creating these.

Temporary Internet Files – Windows Temp Files, Safe To Delete ?
January 14, 2010 — bluecollarpc


# CHECK ALL EXCEPT “Compact Databases”

# CHECK ALL (According to what you have installed – example: Adobe
Reader history)

# CHECK ALL (histories)

# CHECK ALL (histories)

# OPTIONAL – You can check these or not if you wish to review using
these and do not want the histories (logs) deleted.


{TIP: When using ANALYZE make sure you have clicked Run Cleaner and THEN add the items you wish to check without deleting with ANALYZE. Otherwise you will be looking at all the junk files you would normally delete anyway and will muddy the results of an Analyze scan as then you will just see the particular files you wanted to investigate WITHOUT all the other junk files added in the Analyze results.}


# Memory Dumps, Chkdsk File Fragments
…. both of these should be left UNCHECKED as they will invariably only come into play at the rare Computer Crash event. This will inevitably create some special helpful information files of the event (annonymous) that will help Microsoft (or others involved – softwares, browsers, causes – annonymous) that may send out invisibly at the next computer start up.
(There are settings in the Control Panel to turn these off or on – reports – RECOMMENDED to leave ON to be a help to all computer users for causes of these undesirable events that they may create patch/fix/updates to prevent the occasion from occurring again for all) .
(After the computer seems to be working again okay – you may want to check these and then click ANALYZE to see if there are any items here available per scan to delete safely. They would be really small no doubt in size not really affecting overall performance memory wise.)

# Windows Log Files …..are safe to delete, DO NOT click this as a regular clean up each time. These Logs are created automtically by Windows and can contain some information recent events that may be EXTREMELY HELPFUL to discover problems that can be easily fixed. Time to time the computer has been working fine would THEN be a time to ADD THIS to the Run Cl;eaner clean up. It will save nominal disk space as these are never really that big and in text only. The first clean up of these may be a large clean up as to 1M to 10M even at first run and if the computer is a couple years old. (They do pile up needlessly. ) TRY the CCLeaner Analyze first to see files size as example. OTHERWISE LEAVE UNCHECKED ! ! !

# DNS Cache, Font Cache ….. LEAVE UNCHECKED and do not use unless directed to by an at least Advanced User or Tech professional.

# Shortcuts…. DO NOT use this and simply delete those manually as many normal icons you use will suddenly disappear be using this to delete them. For power users building their own custom systems , this may be a desirable action to use this deletion feature.



gerald philly pa usa

Webmaster/malware removal help
Membership/Join List:
Free Malware Removal Help / A Community Website Since 2005

How To Delete Java Temporary Files – Avoid Java Malware Exploits

As well in security it is also recommended to go to Start > Control Panel > Java and open the Java panel and click “Do Not Store Temporary Files On This Computer”  ….

….Malware as well has used Java to infect computers (AND FIREFOX ! ) and can hide in these temporary files in the system. This will not affect navigation at all. These are like Temporary Internet Files and are stored for re-visit to a website to load it just a tad faster as the Temporary Internet Files are used for and stored for those reasons. These are junk/trash files completely safe to delete. (In other words when going to a website – any images and pictures and some text items are stored on the computer as well as the cookies files. When re-visiting that same website – these are uploaded from the computer rather than re-downloading then over the internet each time which makes the loading of the website page a tad faster. In real world – it is like nano seconds of no real noticeable speed to the naked eye. )

%d bloggers like this: