Free Security Stuff Worth It? Complete Package Recommended Here Is!

Free Security Stuff Worth It? Complete Package Recommended Here Is!

NOTE: I am/was Webmaster of the BlueCollarPC .net/.org/.us [all retired] now at permanent BlueCollarPC Security Helper Google Site https://sites.google.com/site/pcsecurityhelper/
Since 2005 we have been graced to help over 12 Million User/Visitors and have maintained honest free best information sharing with integrity expected by the Community at such Help Sites across the web, as expected and demanded. For continual help and information ongoing, stop into our site anytime and even find more stuff to use ! HOME: https://sites.google.com/site/pcsecurityhelper/

You wanted a free package, here you go. A Good Free Package of Security Softwares you can add FREE FREE FREE!

BUT READ THIS FIRST FIRST FIRST !!!!

You will have to understand what is said here. The reasons over 12 million Users/Visitors of my security site trust it/me is that I have always maintained the honesty of NEVER giving bad advice as unresearched and proven. NEVER posting links that lead to malicious infectious websites. NEVER posted any softwares that were bundled with malware or that were other than “Genuine Freeware” – which is the term I invented as meaning no continual or intermittent pop ups or ads or connected to any ad networks or “nagware” they now call it. Of course it is understood that “trialware” is known that it is a free version for a set time that maybe one week, fifteen or thirty days. I have NEVER promoted any “feel good” false sense and environment of computer security – which many commercial sites do for gain such as online magazines etc. One of our Creeds……

“NOTES…..
FUD “Fear, Uncertainty and Doubt, a marketing or political strategy” …
FUD (definition) http://en.wikipedia.org/wiki/FUD
There are many, many idiots and the corrupt in computer security calling all things FUD (or snake oil – worthless product, does nothing – such as industry wide security products as antivirus, antispyware, personal firewalls etc.) . Some of the count are actual cyber criminals socially engineering you ! Some advocate never using a registry cleaner (which can not pass legal compliance in IT Security) – yet they will advise you to use antivirus and antispyware that does indeed remove malware Windows Registry keys. We as intermediate and advanced users have known for years and have used for years Registry products that are an invaluable help to manually locate malware items and as well identify reported malware by security products (antivirus. antimalware, firewalls). These others are telling you ‘feel-good’ false security lies as ‘sugar daddies’ or ease-of-use ‘candy man’ tactics to be your “security guru” at many forums. We do not promote any false sense of security or environment. Those wishing to profit from calling security FUD are what we use to call Judas Iscariot and are NOT welcomed here or anywhere there is intelligence. ”

Originally, a “free package” as a handful of security softwares put together as “layers of security” used to be posted by just about all helpers. BUT this was the early days from 2002 on a few. Many products were not near 100 percent protection (antispyware) so it began to then download some extra free versions as stand alone on demand scanners without Real Time Protection activated (but upon purchase). These were added to one you would buy. What one didn’t get – the others would was the logic and advice. You put together your “security solution”.

This dramatically changed forever now and is no longer good advice to any user. The reason is that the cyber crime threatscape changed for the worst years ago. First they added to payloads malwares that would disable ANY free version on the computer. They could not be used. Then they also added malwares that would attack a paid version on the computer as not all antivirus/antispyware products were best quality that repelled easily these attacks upon them to disable them. Weaker or less than quality premium version (pay for) antimalware products (antivirus and antispyware) were successfully attacked and disabled by the newer malware payloads, which then installed at will the rest of their payloads being successful to disable security products – that would be trojans, spyware, rootkits, viruses, etc.

Here is just one example of this as a common threat nowadays (zillions) :
Security software disabler Trojan
http://www.webopedia.com/TERM/S/security_software_disabler_Trojan.html
Through less than quality firewalls like butter….
Tunneling to circumvent firewall policy
http://en.wikipedia.org/wiki/Tunneling_protocol#Tunneling_to_circumvent_firewall_policy
“Users can also use tunneling to “sneak through” a firewall, using a protocol that the firewall would normally block, but “wrapped” inside a protocol that the firewall does not block, such as HTTP. If the firewall policy does not specifically exclude this kind of “wrapping”, this trick can function to get around the intended firewall policy.”

So in good conscience, there is no way to give the older advice of building some free package of security softwares and tell someone they are good to go. It is now plainly a LIE !!! And big BUT…. There are so many that do not have credit cards to buy products online. There are those that simply will not pay for protection like your thrifty Uncle example. So with these – they still need anything as beating a blank. It HAS to be drilled into their heads that a free version is only a scanner with NO protection and the pay product is necessary for Real Time Protection. This is Reactive and Proactive Security. Reactive security is using free scanners like AVG Free etc. with no Real Time Protection and are used AFTER a threat to the PC is perceived by the user. You scan and attempt to detect any threats and remove them. However, the damages are ALREADY done such as a destructive worm or virus and spyware as well, that all files they wished to get have already been copied and sent to the cyber criminals. TOO LATE NOW ! Proactive is using the product with Real Time Protection running 24/7. This BLOCKS infections before they occur – thus NO loss of personal data and/or actual destruction of the operating system or motherboard or chipsets or disk itself leaving the PC “bricked” – like a brick, doesn’t do anything and makes for a paperweight now. (Bricked is generally the term they use for mobiles toasted by malware).

There are just the FEW free products that offer Real Time Protection. If they refuse to pay or can’t, you have to then offer the “free package” and wish them good luck with the instructions to them about dangers. The free ones with Real Time Protection (heuristics) are simply no where near any best product is the problem aside trying to get something for free. You get what you pay for is the advice and of course you explain and add “Best Practices” advice for safe surfing as best possible (stay away from dark side of internet which is full of infections, etc) and not opening or clicking spam emails or attachments etc.

Having all this in mind, and not simply listing a package as my advice without explanation in full above (what I put my hand to), let’s go ahead and put together that free package…..

FIRST the user needs a product with Real Time Protection. This is ALWAYS the first move/installation.
BEST FREE:
Comodo Free Anti Virus Software Internet Security
http://antivirus.comodo.com/ (Genuine Freeware)
Free Antivirus Software from Comodo eliminates viruses, spyware, and other malware from desktops and networks fighting against Internet security threats. Full Real Time Protection !
PRESS: Great News !
Comodo Internet Security Earns the Prestigious VB100 Virus Certification
HostReview.com (press release) April 14, 2011
http://www.hostreview.com/news/110414-comodo-internet-security-earns-prestigious-vb100-virus-certification

NEXT: (may be tad advanced for newbie)
Spyware Terminator [Genuine Freeware] (Antispyware and antivirus. Real time protection added!)
http://www.spywareterminator.com/
Millions of users worldwide rely on Spyware Terminator, winner of many awards and high ratings from industry experts and users. Its free comprehensive protection is comparable to competitors’ paid versions! Originally with enterprise level Clam Antivirus now has F-Prot Antivirus.
Spyware Terminator includes: http://www.spywareterminator.com/
* Fast spyware scanning
* 100% real-time protection
* HIPS protection
* Antivirus protection
* Multilanguage Support
http://www.spywareterminator.com/
View List of All Features »
http://www.spywareterminator.com/features/antispyware-features.aspx

LAST PLACE:
Microsoft Security Essentials…..(only recommended for Real Time Protection and is now very weak product)
http://www.microsoft.com/security_essentials/
Microsoft Security Essentials provides real-time protection for your home PC, antivirus and antispyware real time shields.

SPECIAL NOTE / BASIC SECURITY….Microsoft: Security Essentials is designed to be bottom of the antivirus rankings. Microsoft has admitted Windows users should install antivirus above and beyond its own Security Essentials, describing its protection as merely a “baseline” that will “always be on the bottom” of antivirus software rankings.
http://www.pcpro.co.uk/news/security/384394/microsoft-security-essentials-is-designed-to-be-bottom-of-the-antivirus-rankings

HOWEVER it must be explained…. Generally, Do not use two antimalware products that have real time protection technology. These generally will conflict and worst. You can use these with free stand alone products that just scan, safely. DO NOT INSTALL ALL THREE OUT OF PARANOIA!!!! Pick one only that has Real Time Protection. These are that Proactive Defense.

BEST FREE STAND ALONE SCANNER – SCAN ON DEMAND (means open it and click scan)…..
Emsisoft Antimalware
http://www.emsisoft.com/en/software/antimalware/
Full antivirus and antispyware combined. This is the best premium product in the world IMO (In My Opinion) beating all others as Norton, ESET NOD32, Sophos etc. Download it and choose either full version free for 30 days to try, or simply click Free Version (without Real Time Protection). With one of the above Real Time Protection products, you can then use the Emsisoft free version to perform a full scan at least once a week. Heavy surfers – scan every or every other day! Great scan options, you can do the quick scan check for malware running right now on the PC (think you may got hit at a site) which takes only a moment. You can choose Smart Scan which checks the usual suspects in the usual places. And then Full Scan which will scan the entire computer system and files. This takes over a half hour with any product, the full scan, but should be done even by advanced users at least once a week or bi-monthly.
http://www.emsisoft.com/en/software/antimalware/

ALSO GET THIS TOO FOR USB DRIVE / USE IF PC IS LOCKED UP, CAN’T NAVIGATE – JUST PLUG IN AND LAUNCH EEK AND SCAN
Emsisoft Emergency Kit 2.0 [genuine freeware, best, recommended]
http://www.emsisoft.com/en/software/eek/
Your emergency kit for infected PCs! Detects and removes Malware > 5 million known dangers. World class dual-scan-engine. 100% portable – perfect for USB sticks. HiJackFree and BlitzBlank included. Self made Emergency USB Drive stick (or purchase) – Expand the content of the Emsisoft Emergency Kit to an USB stick and make your own universal tool to scan and clean infected PCs.

MORE …

ANTIVIRUS:
Avast AntiVirus Home Edition [working-freeware]
http://www.avast.com/eng/avast_4_home.html
Free avast! 4 Home Edition. avast! 4 Home Edition is a full-featured antivirus package designed exclusively for home users and non-commercial use.

BitDefender Free Edition
BitDefender Free Edition is an on-demand virus scanner, which is best used in a system recovery or forensics role. If you are on an “always-on” Internet connection, we strongly advise you to consider using a more complex antivirus solution.
http://www.bitdefender.com/PRODUCT-14-en–BitDefender-Free-Edition.html

AVG – Free Antivirus
http://www.avg.com/us-en/free-antivirus-download
AVG Anti-Virus Free is virus and anti-spyware available for free.

ANTISPYWARE:

SUPERAntiSpyware [working-freeware version]
http://www.superantispyware.com/
SUPERAntiSpyware scans your computer for known Spyware, Adware, Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers and many other types of threats, and allows you to remove or quarantine them. The free version lacks real-time blocking and protection as well as several other advanced options.

Lavasoft Ad-Aware [working-freeware version]
http://www.lavasoftusa.com/software/adaware/
Ad-Aware Personal provides advanced protection from known data-mining, aggressive advertising, Trojans, dialers, malware, browser hijackers, and tracking components. This software is downloadable free of charge for personal use. (Lavasoft Ad-Aware is one of the pioneers in antispyware as we know it today along with Webroot Spysweeper)

Malwarebytes [working-freeware version]
http://www.malwarebytes.org/
Free anti-malware (Has become popular, detection rates have greatly improved ! )

INSTALL QUALITY FIREWALL ASAP! (Microsoft includes a basic firewall now in all editions)
ZoneAlarm Free Firewall (BEST FREE – SET AND FORGET!]
Protect your PC with #1 Free Firewall
http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm

Comodo Personal Firewall [tad advanced for newbies]
(Genuine Freeware, and rated by international tests as about world’s best – now includes antivirus real time)
http://www.personalfirewall.comodo.com/

***Now there is a free security solution with even more to add, below a couple more tools. You get antimalware with Real Time Protection installed for real time protection and then add the free scanner versions to get what that misses – both antivirus and antispyware. With the free scanners, you can download/install all of themwill not conflict with the Real Time Protection product (Comodo etc) installed.

SECURITY TOOLS / UTILITIES

Internet Tracks Cleaners Recommended (Privacy and Security)
CCleaner – Wikipedia, the free encyclopedia (very popular, safe, freeware/donate)
CCleaner supports the cleaning of temporary and unneeded files from certain …
http://en.wikipedia.org/wiki/CCleaner
CCleaner http://www.ccleaner.com/
NOTE FOR AVERAGE USER SETTINGS PLEASE SEE THESE ON MY BLOGPOST HERE:
https://bluecollarpcwebs.wordpress.com/2012/01/14/recommended-settings-and-use-of-ccleaner-temparary-internet-files-clean-up-browsers-applications/
[You should have browsers Settings to delete all internet history each time it closes. Do NOT keep cookies on your computer at all. They have been broken into by crimewares now. Cookies should only be given session cookies permissions as a privacy and security issue (cookies have been broken into by malwares) and only if necessary.

Secunia Personal Software Inspector (PSI) [MILLIONS OF DOWNLOADS]
The Secunia PSI is a free security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Set to automatic or manual Update for all, will not install the purchase Upgrade versions – just Updates released by the software companies.
http://secunia.com/vulnerability_scanning/personal/

ESET (NOD32) Stand-alone malware removal tools
http://kb.eset.com/esetkb/index?page=content&id=SOLN2372

ADD FOR FIREFOX….
BetterPrivacy :: Add-ons for Firefox
https://addons.mozilla.org/en-US/firefox/addon/6623
Remove or manage a new and uncommon kind of cookies, better known as LSO’s.The BetterPrivacy safeguard offers various ways to handle Flash-cookies set by Google, YouTube, Ebay and others… Go through Settings and click to always delete all when browser closes or paranoid – check to give permission to these on case to case basis.

EULAlyzer 1.1 [freeware]
http://www.javacoolsoftware.com/eulalyzer.html
EULAlyzer can analyze license agreements in seconds, and provide a detailed listing of potentially interesting words and phrases. Discover if the software you’re about to install displays pop-up ads, transmits personally identifiable information, uses unique identifiers to track you, or much much more.

RESET PC WHEN INFECTED AFTER CLEANING UP:
Microsoft Malware Prevention troubleshooter
http://support.microsoft.com/kb/2534555
The Microsoft Malware Prevention trouble shooter is designed to scan your computer and make recommended changes based on your current settings to provide you with the most up to date security for your Windows operating system. Building up your computer’s defenses helps secure your computer against viruses and other malicious software.

The Microsoft Malware Prevention troubleshooter does the following:
•Turns on your Windows Firewall. Enabling your Windows Firewall will protect your computer by blocking communication to your PC that may be malicious software.
•Antivirus software: Checks your Antivirus protection status. You will be prompted to update your Antivirus program if it is not up to date or enable Real-time protection. If you don’t have an anti-virus program installed it will offer you to use Microsoft Security Essentials or learn more about other security software partners.
•Turns on Automatic Update. Windows Update helps keep your PC current, secure and enhance performance by automatically downloading and installing the latest security and feature updates from Microsoft. This helps ensure that both Important and Recommended updates are downloaded.
•Pop-blocker: Enabling Pop-up Blocker will make browsing the web safer by helping prevent malicious or unsafe pop-ups from automatically appearing.
•Remote Registry: The Windows Remote Registry service enables remote users to modify registry settings on this computer. If this service is stopped the registry can be modified only by users on this computer as opposed to over the network.
•Internet Explorer: The package will inform you if you have the latest version of Internet Explorer installed. It will also modify your current privacy settings to ensure you have a safe browsing experience. The package will delete your internet cache and browsing history, which will help protect against malicious threats attempting to access your computer while you’re online.
•Enables User Account Control (UAC). User Account Control (UAC) will prevent malicious software from modifying your computer settings without your consent.
•Proxy Settings: If malicious software has modified your Internet Proxy settings, therefore making it difficult to get online, the package will reset your settings so you can browse the internet normally.

ADVANCED:

ProcessQuickLink [Genuine Freeware]
http://www.processlibrary.com/quicklink/
For your PC to function Windows needs to run and manage many different processes. While many processes run by Windows are essential and legitimate, most PCs get bogged down with processes that are useless or downright harmful. ProcessQuickLink gives you an easy way to analyze each process running on your PC. Is it a resource hog? Could it be part of a virus infection? Or maybe a sign of spyware? ProcessQuickLink will give you the answer. How it works….. Once you install ProcessQuickLink access the Task Manager. Near each process you will see an button. Click on the button and you will be linked to the process page as listed on processlibrary.com.

HiJackFree (freeware)
Freeware! HiJackFree helps advanced users to detect and remove Malware manually. With HiJackFree you can manage all active processes, services, drivers, autoruns, open ports, hosts file entries and many more. For your full control over your system.
http://www.hijackfree.com/en/

BEST MOST TRUSTED REGISTRY CLEANER:
PowerTools Lite – The Freeware Registry and System Cleaner
https://www.macecraft.com/slides/powertools-lite-2013/
PowerTools Lite 2011 is a freeware edition of jv16 PowerTools – the ultimate Windows optimization and tuneup utility suite. PowerTools Lite 2011 allows you to easily clean up your computer from unneeded data, unused temp files, registry left overs and automatically fix registry errors.
NOTE: jv16 PowerTools has been about the best registry cleaner loaded with extra advanced features including registry editor for years and years since the beginning. Recently over a year ago they released the above free edition which has four levels of intensity clean for beginner to advanced. Very safe. Very trusted .
PREMIUM jv16 PowerTools:
http://www.macecraft.com/
http://en.wikipedia.org/wiki/Jv16_powertools

Belarc Advisor (Freeware)
The Belarc Advisor builds a detailed profile of your installed software and hardware, missing Microsoft hotfixes, anti-virus status, …
ABOUT BELARC
http://www.belarc.com/about.html
Belarc, located in Maynard, MA, develops and licenses Internet based products which help make personal computers easier to use and maintain by large enterprises, small businesses and individual consumers. Our products are used for software license compliance, hardware upgrade planning, cyber security status, information assurance audits, IT asset management, configuration management, and more. Belarc’s products are in use on well over twenty million computers and are licensed by numerous customers including: AIG, Dana, Kindred Healthcare, NASA, National Park Service, U.S. Air Force, U.S. Army, U.S. Census Bureau, U.S. Coast Guard, U.S. Marine Corps, U.S. Navy, Unilever, WebMD/Emdeon, and many more.

Trend Micro RUBotted (free)
http://www.trendsecure.com/portal/en-US/tools/security_tools/rubotted
Malicious software called Bots can secretly take control of computers and make them participate in networks called “Botnets.” These networks can harness massive computing power and Internet bandwidth to relay spam, attack web servers, infect more computers, and perform other illicit activities.
Security experts believe that millions of computers have already joined Botnets without the knowledge of their owners. By using remotely-controlled computers, the criminals in charge of the Botnets try to remain anonymous and elude authorities seeking to prosecute them. RUBotted monitors your computer for suspicious activities and regularly checks with an online service to identify behavior associated with Bots. Upon discovering a potential infection, RUBotted prompts you to scan and clean your computer.

Reading Blue Screen of Death Codes
http://www.howtogeek.com/97093/ask-htg-reading-blue-screen-codes-cleaning-your-computer-and-getting-started-with-scripting/?utm_source=newsletter&utm_medium=email&utm_campaign=081111
Generally IRQL errors are hardware or driver related. We’d suggest
checking to see if any drivers have been updated recently and either
roll them back to the old driver or see if an even newer driver is
available (the vendor may have released a driver to fix the crashes). If
that doesn’t help you’ll find BlueScreenView, a crash dump analyzer,
rather helpful. We have a guide to using BlueScreenView to help get you
started……
BlueScreenView v1.40 – View BSOD (blue screen) crash information stored in dump files.
Copyright (c) 2009 – 2011 Nir Sofer
http://www.nirsoft.net/utils/blue_screen_view.html

GO PORTABLE! PUT TOGETHER PORTABLE SECURITY PACKAGE! I really recommend you install this for the USB Drive and then add the portable versions below….
GET: PortableApps.com software for USB Drive…. (has all kinds of portable apps listed you can install at will, plus you can check to get updates from each app (security updates, bug fix, etc) automatically or manually….
PortableApps.com
http://portableapps.com/
Provides packaged software suitable for use on portable media, without leaving settings files on the host computer. Includes developer information, discussion …

ADD SECURITY TOOLS PORTABLE APPS
Try clean up with portable products when access/download blocked or getting dreaded Blue Screen Of Death……

How to Remove Boot Block Malware
http://www.ehow.com/how_5941797_remove-boot-block-malware.html
Boot block malware is malicious software that settles into your computer’s hard
drive in the first sector and replaces the boot block instructions with malware
instructions. When you start, or boot up, your computer, the malware is loaded
into your computer’s memory and from there it can spread to any other part of
your computer. ….
http://www.ehow.com/how_5941797_remove-boot-block-malware.html

USE THE FOLLOWING TO REMOVE MALWARE – ROOTKIT/BOOTKIT BOOT-BLOCK TYPE MALWARES ….. EMSISOFT EMERGENCY KIT AND/OR MICROSOFT WINDOWS DEFENDER OFFLINE

Emsisoft Emergency Kit 2.0 [genuine freeware, best, recommended]
http://www.emsisoft.com/en/software/eek/
Your emergency kit for infected PCs! Detects and removes Malware > 5 million known dangers. World class dual-scan-engine. 100% portable – perfect for USB sticks. HiJackFree and BlitzBlank included.
Emsisoft BlitzBlank
BlitzBlank is a tool for experienced users and all those who must deal with Malware on a daily basis. Malware infections are not always easy to clean up. These days the software pests use clever techniques to protect themselves from being deleted. In more and more cases it is almost impossible to delete a Malware file while Windows is running. BlitzBlank deletes files, registry entries and drivers at boot time before Windows and all other programs are loaded.
Self made Emergency USB stick – Expand the content of the Emsisoft Emergency Kit to an USB stick and make your own universal tool to scan and clean infected PCs.

Microsoft Standalone System Sweeper (Beta) [FREE]
http://connect.microsoft.com/systemsweeper
NOW CALLED Windows Defender Offline
http://windows.microsoft.com/en-US/windows/what-is-windows-defender-offline
NEWS:
Microsoft ships free malware cleaner that boots from CD or USB
ZDNet (blog)
June 1, 2011, 10:15am PDT In a move aimed at cutting down on support call costs, Microsoft has released a malware recovery tool that boots from a CD or USB stick. Ryan Naraine is a journalist and social media enthusiast specializing …
http://www.zdnet.com/blog/security/microsoft-ships-free-malware-cleaner-that-boots-from-cd-or-usb/8712

Windows Defender Offline Beta
(Free from Microsoft, Scan with Windows Defender Offline Betafrom CD/DVD or USB Drive at Start Up to remove blocking malwares)
http://windows.microsoft.com/en-US/windows/what-is-windows-defender-offline

What is Windows Defender Offline Beta?
http://windows.microsoft.com/en-US/windows/what-is-windows-defender-offline
Windows Defender Offline Beta: frequently asked questions
http://windows.microsoft.com/en-US/windows/windows-defender-offline-faq
How to Create a Bootable Offline Version of Windows Defender
http://www.howtogeek.com/100289/how-to-create-a-bootable-offline-version-of-windows-defender/?utm_source=newsletter&utm_medium=email&utm_campaign=221211

We should point out that you can also scan your PC with a
BitDefender boot disk
http://www.howtogeek.com/howto/36677/how-to-use-the-bitdefender-rescue-cd-to-clean-your-infected-pc/
Kapersky boot disk
http://www.howtogeek.com/howto/36403/how-to-use-the-kaspersky-rescue-disk-to-clean-your-infected-pc/
Avira boot disk
http://www.howtogeek.com/howto/38889/how-to-use-the-avira-rescue-cd-to-clean-your-infected-pc/
or even an Ubuntu Live CD,
http://www.howtogeek.com/howto/14434/scan-a-windows-pc-for-viruses-from-a-ubuntu-live-cd/
this is one more tool to add into your toolkit.

ClamWin Portable (Antivirus, more) [FREE]
http://portableapps.com/apps/utilities/clamwin_portable
Antivirus to go…. ClamWin Portable is the popular ClamWin antivirus packaged as a portable app, so you can take your antivirus with you to scan files on the go. You can place it on your USB flash drive, iPod, portable hard drive or a CD and use it on any computer, without leaving any personal information behind.
NEWS: ClamWin Portable 0.97.1 (anti-virus) Released | PortableApps.com …
ClamWin Portable 0.97.1 (anti-virus) Released. Submitted by John T. Haller on June 17, 2011 – 7:46pm. logo ClamWin Portable 0.97.1 has been released. …
http://portableapps.com/news/2011-06-17_-_clamwin_portable_0.97.1_released

SUPERAntiSpyware Portable Scanner (Antispyware) [FREE]
http://www.superantispyware.com/portablescanner.html
Follow the instructions below to download the SUPERAntiSpyware Portable Scanner. The scanner features our complete scanning and removal engine and will detect AND remove over 1,000,000 spyware/malware infections. The scanner does NOT install anything on your Start Menu or Program Files and does NOT need to be uninstalled. The scanner contains the latest definitions so you DO NOT need Internet Access on the infected system to scan.

Comodo Cleaning Essentials
Comodo Cleaning Essentials is a set of portable antivirus tools
that will help you to detect and remove malware from an infected PC.
http://www.comodo.com/business-security/network-protection/cleaning_essentials.php
(DESKTOP http://www.comodo.com/ )

ESET SysInspector is a powerful, portable security tool that will inspect your system’s files, running processes, Registry keys and more, looking for and highlighting anything that could be a sign of malware.
(Makers of famous Eset NOD32 Antivirus – most awarded in history)
http://www.downloadcrew.com/article/20672-eset_sysinspector_12026_32-bit
(DESKTOP http://www.eset.com/us/ )

Norman Malware Cleaner is an interesting portable antivirus tool which will scan your PC, detecting and removing any malware that it uncovers.
http://www.downloadcrew.com/article/23283-norman_malware_cleaner
(DESKTOP http://www.norman.com/en-us )

The AVG Rescue CD is a portable environment that comes with a range of tools to help you clean up a virus-infected PC, fix hard drive problems, and get an unbootable system working again. This variant of the rescue CD is intended for installation on a USB flash drive. After downloading, you should extract the archive contents directly to the root folder of the USB drive you’d like to use. (If you don’t have a tool that can read RAR files, then try 7-ZIP).
http://www.downloadcrew.com/article/4650-avg_rescue_cd_usb_flash_drive_edition
(DESKTOP http://www.avg.com/us-en/homepage

CCleaner Portable
CCleaner Portable is a compact version of CCleaner that you can store on a CD, USB flash drive, microSD, or even two floppy disks if you still use those.
http://www.softpedia.com/get/PORTABLE-SOFTWARE/Security/Secure-cleaning/Windows-Portable-Applications-CCleaner-Portable.shtml
(DESKTOP http://www.piriform.com/ccleaner )

Emsisoft Emergency USB Stick (Antivirus + Antispyware) [BUY]
http://www.emsisoft.com/en/software/stick/ (USB Drive / Installed)
Emsisoft Anti-Malware Personal Edition. Malware, adware and spyware removal and scanning. Plug in an run – It is that easy to clean an infected computer with the Emsisoft Emergency USB Stick!
How it works: The Emsisoft Emergency USB Stick contains two useful programs which can be used to scan and clean an infected computer
quickly without a required software installation

How to Make a Bootable Antivirus Cd
How to Make a Bootable Antivirus Disc This document will teach you how to make a bootable anti-malware ( bootable antivirus ) cd/dvd step-by-step. … This is the best free way to remove any piece of malware with a 100% success rate. Steps: … Get Free Ultimate Boot CD
http://windows7themesxp.com/2011/09/how-to-make-a-bootable-antivirus-cd.html

HAPPY AND SAFE COMPUTING FROM THE WEBMASTER !
ONLINE HELP 24/7 BlueCollarPC Security Helper Website:
HOME: https://sites.google.com/site/pcsecurityhelper/PCSecurityHelper
HELP CENTER: https://sites.google.com/site/pcsecurityhelper/malware-removal-center
THREATS FAQS: https://sites.google.com/site/pcsecurityhelper/contact
BLOG: https://bluecollarpcwebs.wordpress.com


SENDER: gerald309 —
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005
MOBILES: http://pdamobilecafe.wordpress.com/
Alerts: pdamobilecafemobilealertlist-subscribe@yahoogroups.com
RSS: https://groups.google.com/forum/feed/pdamobilecafe-mobilealerts/msgs/rss.xml?num=15

Lenovo Slipped Superfish Malware Into Laptops (Windows 8.1)

Lenovo Slipped Superfish Malware Into Laptops (Windows 8.1)

If you have missed the security furor over Lenovo pre-installing adware (antispyware catagory of antimalware products) you may want to check out these news links for information, degree of danger, and most importantly removal instructions (easy).

It is absolutely recommended to remove this immediately by all. Lenovo has been caught and publicly apologized. Just about all new computers come with what they used to call “bloatware” which is a handful of extra softwares which some may find useful. They take up space and may even slow down performance. But this is a big no-no Lenovo has done. It became as infamous as the Sony Rootkit malware they bundled in downloads, of music I believe it was, a good while ago.

A snippet…. (Removal help/instructions below)

“…The furor blew up because Lenovo installed Superfish adware on consumer laptops sold between September 2014 and January 2015. All these laptops were running Microsoft Windows 8.1. Your laptop fits the time frame, but you may have escaped for two reasons. First, Superfish was not installed on Lenovo’s business machines, such as ThinkPads. Second, it was not installed on laptops running Windows 7, which is still the business standard…..”
SOURCE: http://www.theguardian.com/technology/2015/feb/26/how-can-i-find-and-remove-superfish-and-similar-malware

LINKS: / PRESS

US-CERT: Lenovo Superfish Adware Vulnerable to HTTPS Spoofing
https://www.us-cert.gov/ncas/alerts/TA15-051A

Lenovo Slipped ‘Superfish’ Malware Into Laptops
malaysiandigest.com
LenovoComputer maker Lenovo has been shipping laptops prepackaged with malware that makes you more vulnerable to hackers — all for the sake …
http://www.malaysiandigest.com/technology/542592-lenovo-slipped-superfish-malware-into-laptops.html

Lenovo computers come with pre-installed adware and MITM proxy
Posted on Feb 19, 2015 10:45 am
If you have recently bought a new Lenovo computer, you’re in for a nasty surprise: the company has been shipping them with pre-installed adware. And, what’s even worse, the software in question is…
Read in browser »
http://www.net-security.org/secworld.php?id=17973

Lenovo apologises for preinstalling malware on its PCs that can snoop on
its customers’ bank …
SmartCompany.com.au
The preinstalled malware, known as Superfish, intercepts and decrypts
secured HTTPS connections, which are used to send sensitive information …
http://www.smartcompany.com.au/finance/45798-lenovo-apologises-for-preinstalling-malware-on-its-pcs-that-can-snoop-on-its-customers-bank-accounts.html#

US cyber-cops declare WAR on Superfish ad-spewing malware lurking in Lenovo laptops
The Register
The US government’s Computer Emergency Readiness Team (US-CERT) today said the Superfish ad-injecting malware installed by Lenovo on its …
http://www.theregister.co.uk/2015/02/20/superfish_is_malware_us_government/

— REMOVAL HELP:

Superfish Uninstall Instructions (Lenovo Website)
http://support.lenovo.com/us/en/product_security/superfish_uninstall
NOTE: Please download and run the Automatic Removal tool executable to ensure complete removal of Superfish and Certificates for all major browsers.

Superfish malware: how do you know if your computer is affected? And how do you get rid of it?
Belfast Telegraph
The Superfish malware that was revealed last week to have been installed onto Lenovo laptops could allow hackers to watch your internet activity and …
http://www.belfasttelegraph.co.uk/technology/superfish-malware-how-do-you-know-if-your-computer-is-affected-and-how-do-you-get-rid-of-it-31015018.html

How to wipe Superfish adware and offending cert from your Lenovo laptop
Posted on Feb 20, 2015 12:38 pm
After the recent revelation that Lenovo has been shipping some of it laptops with pre-installed adware that’s also breaking the security of secure connections by using self-signed MITM SSL certificate…
Read in browser »
http://www.net-security.org/secworld.php?id=17979

How to remove the dangerous Superfish adware preinstalled on Lenovo PCs
PCWorld
You can revoke that certificate manually, however. Here’s how, as told to PCWorld by Chris Boyd, a malware intelligence analyst at Malwarebytes. ….
http://www.pcworld.com/article/2886278/how-to-remove-the-dangerous-superfish-adware-presintalled-on-lenovo-pcs.html

Information and Fix for newest Internet Explorer Zero Day flaw

Information and Fix for new Internet Explorer Zero Day flaw
 
Yes there is a new Internet Explorer Zero Day,
Definition:
 
We hope our Visitors to our site observe the RSS Headliners on the left border which if clicked will take you to the Full Message at our BlueCollarPCSecurity Google Group with RSS Feeds also. Yahoo Groups has discontinued theirs just shortly ago, so we set up the Google Group for our Alerts RSS feed you can add to any RSS Reader also.
 
I have forgotten to post this new zero day exploit in Internet Explorer (all versions) information in our Blog Posts (center of our site, here) and we apologize to casual Visitors who may not have been alerted to this at our site as a plain in your face can’t miss post.
 
A Zero Day existing is a dangerous possibility existing for malware and cyber criminals to take stealth control of the PC system, and spy and worst, on infected computers by them via the Zero Day exploit.
 
Sometimes a Zero Day is in the actual Operating System itself (Windows). Here is one has been discovered in the Internet Explorer browser. These are fairly rare, and there are really only handfuls of them found over the years. The problem obviously is that either Windows or the browser has no defense (which ever the case with a zero day) basically and is prey. The only defense is generally a quality antimalware product with Real Time Protection enabled, usually as the yearly paid subscription. There are only a couple free ones with Real Time Protection (sometimes called HIPS, heuristics sniffs and blocks attempts in real time 24/7) like paid antimalware. Free home versions of antimalware DO NOT have Real Time Protection you have to pay for to enable, and therefore DO NOT block malware and attempts on the browser to gain access to the system with malware such as a Drive By infection – unseen while browsing the Net arriving at a bad website infects the PC without protection in place.
 
No there has not been the emergency patch yet from Microsoft. It may be issued in this next normal cycle of Windows Updates on the Second Tuesday (Patch Tuesday) each month which will be for October 2013. Generally there is what is called an Emergency Out-Of-Cycle Patch issued, meaning released when ready at anytime rather than in normal monthly Windows Updates every Second Tuesday each month. Yes there is a Microsoft Fix-It temporary fix available – SEE below, link.
 
MICROSOFT OFFICIAL FIX-IT SITE FOR THIS ZERO DAY…
Microsoft Security Advisory: Vulnerability in Internet Explorer could allow remote code execution
 
ALSO you can use alternative free Mozilla Firefox browser until a Patch is issued. On Internet Explorer you can go to Settings and raise the Security Settings all the way up which blocks all Java, add-ons, and scripts and auto runs at websites and players etc. Kind of basically like plain text email.
 
 
National Cyber Awareness System:
Microsoft Releases Security Advisory for Internet Explorer
09/18/2013 03:33 PM EDT
Original release date: September 18, 2013
 
Microsoft issues emergency fix for Internet Explorer vulnerability
UPI.com
17 (UPI) — U.S tech giant Microsoft says it is issuing an emergency fix
to an Internet Explorer bug that has been exploited in active malware
attacks. All versions …
 
NOTE: All versions of Internet Explorer browser from Version 6 to 10 and 11 for Windows 8.1 are
affected, current temporary fix is designed to prevent exploitation of
the bug – and a permanent fix may follow at a later date.
 
NEWS LINKS TO DATE….
 
Microsoft issued Fix it for actively exploited IE 0-day
Posted on Sep 18, 2013 04:22 pm
Microsoft has yesterday unexpectedly released a security advisory warning users about instances of active exploitation of a vulnerability found in all supported versions of Internet Explorer (6-11). …
Read in browser »
 
LINK TO OFFICIAL MICROSOFT SITE….
 
Microsoft Security Advisory (2887505)
Vulnerability in Internet Explorer Could Allow Remote Code Execution
Published: Tuesday, September 17, 2013
 
Heavy Attacks Expected as Microsoft Scrambles to Fix IE Flaw
TechNewsWorld
Although it hasn’t been determined yet what malware is connected to the
exploit, it can be … “These exploits typically are used to download
advanced malware …
 
Latest IE 0-day insight: Background, severity and solutions
Posted on Sep 19, 2013 09:48 am
This recently discovered Internet Explorer zero day vulnerability is bad. Users and administrators should take immediate action to mitigate the risk. Considering the timing, I personally expect to see…
Read in browser »
 
IE 0-day attack reports push ISC to raise official threat level
Posted on Sep 23, 2013 03:41 pm
Over the weekend, FireEye researchers have managed to shed some light on the in-the-wild attacks leveraging the latest discovered Internet Explorer zero-day vulnerability (CVE-2013-3893), and have tra…
Read in browser »
 
 
Latest IE 0-day still unpatched, attacks exploiting it go back three months
Posted on Sep 30, 2013 02:59 pm
While Microsoft is yet to issue a patch for the latest Internet Explorer zero-day (CVE-2013-3893), reports are coming in that the flaw has been exploited more widely and for a longer time than initial…
Read in browser »
 
 
Internet Explorer Zero-Day Malware Spreads Across Asia
 Tom’s Guide
A very serious zero-day exploit affecting Internet Explorer has gone into wide release, affecting banking and government websites in Japan and Taiwan as more …
 
New threats exploit IE flaw
ITWeb
FireEye says APT campaigns have specific activity that can be clustered
and tracked by unique indicators, and some campaigns employ the same
malware …
 
 
Zero-Day exploit (Definition)
 
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005

Options: How To Reset, Refresh, Reinstall Windows 8

Options: How To Reset, Refresh, Reinstall Windows 8 – Also Recovery Drive, System Repair Disk ….

I recommend going to the first link below here at Microsoft to get a little oriented into the several easy new options with Windows 8 as Refresh or Reset. These do not involve reinstalling Windows like traditionally from a Emergency Rescue Repair CD/DVD but may serve the same purpose. Of course with any suspected or actual malware infestation and infection go ahead with the old familiar re-install Windows as safest. You will absolutely want to create easily your Emergency Repair Disk and now also on Windows 8 you can use a USB Drive (sometimes called a thumb drive, like a USB Media Stick but must be USB Drive – same price).  

How to restore, refresh, or reset your PC
Applies to Windows 8, Windows RT
If you’re having problems with your PC, you can try to restore, refresh, or reset it. Restoring your PC is a way to undo recent system changes you’ve made. Refreshing your PC reinstalls Windows and keeps your personal files, settings, and the apps that came with your PC and apps that you installed from Windows Store. Resetting your PC reinstalls Windows but deletes your files, settings, and apps—except for the apps that came with your PC.
 
Create a USB recovery drive
 
 
How to Create and Use a Recovery Drive or System Repair Disc in Windows 8
Windows 8 allows you to create a recovery drive (USB) or system repair disc (CD or DVD) that can be used to troubleshoot and restore your computer. Each type of recovery media gives you access to Windows’ advanced startup options. …
 
 
Everything You Need to Know About Refreshing and Resetting Your Windows 8 PC
Windows users regularly reinstall Windows (or restore from a recovery partition) to fix system problems. Windows 8 includes easier-to-use “Refresh” and “Reset” options that quickly restore Windows to a fresh, factory default configuration….
 
 
How to Use Refresh and Reset in Windows 8 to Easily Reinstall Your PC
Sick of formatting? Then learn how to breathe new life into your machines without formatting using the new Refresh and Reset features present in Windows 8. ….
 
 
How to Create a Custom Refresh Image in Windows 8
We have already shown you how to use the Refresh and Reset features in Windows 8, now we are back to show you how you can create a custom refresh image. This means next time you refresh your Windows 8 PC, you can use a custom image instead of the one that shipped with your PC. ….
 
 
How to Refresh or Reset Your Windows 8 PC Without the DVD
We have already shown you how you can use the new refresh and reset features in Windows 8 instead of formatting your PC, the problem is that you are required to insert your Windows DVD every time you want to use the features. Here’s how to do it without the DVD. ….
 
 YOU MAY WANT TO ADD….How to Make the F8 Key Work for Safe Mode in Windows 8
http://www.howtogeek.com/164001/how-to-make-the-f8-key-work-for-safe-mode-in-windows-8/?utm_source=newsletter&utm_medium=email&utm_campaign=270513
Booting into safe mode became non-trivial in Windows 8, especially if you were accustomed to the old F8 shortcut. Here is how to get F8 working again.
Note: we aren’t necessary recommending that everybody make this change – we are just showing that it is still an option. You can alternatively use some of the new Windows 8 features to fix your computer instead. ….ADDITONAL INFORMATIONHow To Access The BIOS On A Windows 8 Computer
http://www.makeuseof.com/tag/how-to-access-the-bios-on-a-windows-8-computer/
Among the many changes coming with Windows 8 and new computers designed for it is a change in the way we access our computers’ BIOS. No longer do we press a certain key during the boot process to reveal the BIOS – instead, an option to access the BIOS is located in Windows 8’s boot options menu. Traditionally, computers displayed a message like Press F2 to enter setup ….
UEFI vs. BIOs in Windows 8 for desktop startup
TechTarget
http://searchenterprisedesktop.techtarget.com/tip/UEFI-vs-BIOs-in-Windows-8-for-desktop-startup
Because the Windows 8 implementation of UEFI includes Secure Boot, an operating system such as Linux must be digitally signed by a trusted certificate authority (CA). In order for any Windows 8-certified machine to dual-boot into Linux, IT must ensure …
 
 
 
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005
 
 

False Claims: Using a Registry Cleaner Will Not Speed Up Your PC (Actually Does)

False Claims: Why Using a Registry Cleaner Will Not Speed Up Your PC …
WE TOTALLY DISAGREE WITH THE FOLLOWING ARTICLE, AND IF AS STATED THAT REGISTRY CLEANERS WERE SNAKE OIL (WORTHLESS, FALSE ADVERTISEMENT AND CLAIM) THERE WOULD BE PLENTY OF COMPLAINTS AND SUITS AND LEGAL ACTION BY CONSUMERS AND GROUPS AND THE LAW BROUGHT AGAINST THEM IN ALL THESE YEARS FOR SUIT AND CEASE AND DESIST TYPE ORDERS FROM A COURT WITH PENALTIES/FINES FOR FALSE ADVERTISING. ……
THIS IS IRRESPONSIBLE AND UNINFORMED AND AS THEY ARE NOT EXPERTS AND PROFESSIONALS PRODUCING PRODUCTS FOR THE WINDOWS PC.
HOWTOGEEK.COM IS RARELY WRONG BUT ATE A BIG FOOT IN THE MOUTH ON THIS ONE. WRITE ONLY ABOUT WHAT YOU KNOW – OLD AXIM.
ARTICLE:
Why Using a Registry Cleaner Won’t Speed Up Your PC or Fix Crashes
We’ve said it again and again: Registry cleaners don’t speed up your PC. At best, they’re a waste of time — and often money. At worst, they can cause problems by removing registry entries they shouldn’t.
READ THEIR ARTICLE AND RETURN HERE AND READ OUR BLOG POSTS ON THE SUBJECT AND CHECK OUT OUR WEBPAGE AT OUR SITE FOR THE WINDOWS REGISTRY HELP…  http://bluecollarpc.us/windows-registry-help/
NO BENCHMARK TESTS?
QUOTE: http://www.howtogeek.com/171633/why-using-a-registry-cleaner-wont-speed-up-your-pc-or-fix-crashes/ “…No legitimate benchmarks showing a performance increase as a result of a registry cleaner have ever been released. If a registry cleaner offered boosted performance, we would have some benchmarks by now.”
BENCHMARK RESULTS…
New jv16 PowerTools 2014 software delivers over 20% improved benchmark
scores and Windows startup times.
The new 2014 edition improves performance and cleans errors from
Windows-based systems with ease. The 2014 version was released alongside a
benchmark study which shows that this latest edition can deliver over 20%
improvement to system benchmark scores and Windows startup times.
For more information, please see:
BLUECOLLARPC.US BLOGPOST
Restricted Sites Utilities Softwares Fraud,Potentially Damaging Windows Registry
By bluecollarpcLast updated: Sunday, May 23, 2010 – Save & ShareLeave a Comment
About Software Utilities Adding Restricted Sites lists to the Registry

THIS IS ABOUT USING RESTRICTED SITES UTILTITIES FOR “BROWSER IMMUNIZATION” OR “BLOCKS POTENTIALLY UNWANTED SPYWARE AND OTHER UNWANTED SOFTWARES” etc.

THIS EXPLAINS WHY THEY ARE A SCAM AND DAMAGING TO COMPUTERS AS WILL EVENTUALLY DESTROY THE COMPUTER SYSTEM RENDERING IT INOPERABLE

ASIDE FROM THE FACT THAT THIS BROWSER SOFTWARE SETTING ENTERS A REGISTRY KEY FOR EVERY WEBPAGE OR SITE BLOCKED AND HAS BEEN CIRCUMVENTED BY MALWARE – WE WILL START HERE WITH THE FACTS THAT CONTINUAL ENTRIES INTO THE WINDOWS REGISTRY WILL DESTROY THE SYSTEM MAKING IT INOPERATIVE…..

YOU MOST LIKELY THINK THEY ARE SOME MAGIC WAND OF PROTECTION — HERE IS ALL THEY DO AS “IMMUNIZATION” OR “PROTECTION” FOR DONATION MONEY…….
How to use security zones in Internet Explorer
http://support.microsoft.com/kb/174360
Restricted Sites Zone
“This zone contains Web sites that you do not trust. When you add a Web site to the Restricted Sites zone, you believe that files that you download or run from the Web site may damage your computer or your data. By default, there are no Web sites that are assigned to the Restricted Sites zone, and the security level is set to High.”
Generally the registry value added is “4″ from 0-4 SEE:   HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInternet SettingsLockDown_zones4
SO THAT ONE KEY WILL BE ENTERED BY THEM FOR EACH BAD SITE THEY ADD TO UPDATE DEFINTIONS…..EXAMPLE:

EACH SITE ADDRESS MUST BE ENTERED HERE AS A “RETRICTED SITE” …..
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet
SettingsZoneMapDomains

EXAMPLE…. We are placing “adult.com” in Restricted Sites to show the key made immediately and written into the Windows Registry (adult.com as example here to block underage users on same PC – not saying it is a bad site at all)
HERE IS THE KEY IMMEDIATELY WRITTEN INTO THE REGISTRY TO BLOCK BROWSER ….
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet SettingsZoneMapDomainsadult.com

What Professionals and Experts say…..

You will see below a Professional explanation and why registry cleaners are used to prevent damage to Windows and/or softwares. Whereby certain utilities may add lists of sites and domains – this can be an exact example of “incremental entries” by softwares, or manually, into the Registry constantly per “definitions” Updates (lists of ‘bad’ domains added)….

Product Incrementation of Windows Registry –
Windows Registry Size Limits
http://www.liutilities.com/products/registrybooster/faq/registrycleaner/

“Fragmentation is a serious problem and occurs when application processes modify the registry continually and incrementally .
Eventually registry file sizes may exceed the Registry Size Limits imposed by Windows. This causes subsequent modifications to the registry to fail. Most registry repair software allow you to defrag your registry ensuring that such issues do not occur. This is true prevention.”

…..the constant inordinate or unusual ‘incrementation’ of constantly adding Restricted Sites and domain entries in great mass volume offers no real protection – as malware circumvents the Restricted Sites feature of any browser anyway – and as explained will lead to failure of software running processes and application design as well as the Windows Operating System.

The Windows Registry has an imposed size limit. When this is approached and to succession – Windows will fail to operate as well as other software that relies on normal incremental changes such as definition updates to antivirus and critical Windows Updates as prime example.

What is bottom line is, actually Windows can cease to function at some point of additions to the Windows Registry just like regular hard drive memory runs out at some point of continual downloads of files, media, etc.

SEE: Microsoft – Windows Registry Size Limits Imposed
Below are the Experts and creators of Windows facts….

Windows Registry Size Limits Imposed / Microsoft…
http://msdn.microsoft.com/msdnmag/issues/01/12/XPKernel/
There is a limit on the size of the System hive (the file that stores the HKEY_LOCAL_MACHINESystem key and its descendants) of 200MB, because of restrictions placed on the operating system boot loader by the environment in which it runs (the boot loader reads the System hive into memory very early in the boot process), but the limit for the System hive was just 12MB in previous versions of Windows…..

MORE:
Registry Size Limit functionality has been removed from Windows Server 2003 and from Windows XP
http://support.microsoft.com/kb/292726
Windows Registry Size Limits
http://msdn2.microsoft.com/en-us/library/ms724872.aspx
Registry Size Limit
http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/r

Don’t listen to hackers – and this is extremely crucial with all systems released before Windows XP. The XP size limit was increased but has an imposed Size Limit by Microsoft. Some say “don’t worry about it”… and those are just the persons you remember when your computer fails. Too late then.

Hackers may tell you to set up “registry folders” for Windows 98 and 95 to place these downloads (lists) in that would save or add registry room which would be preposterous. Hackers will tell you if and when you run out of room in XP you can “increase the paged pool size – no problem”. Neither of these work or are true – and are bad hacks and they may be intentionally attempting these malicious pranks at your expense to destroy peoples machines like the “kiddie script” malware writers for “bragging rights” achieved. DUMP IT !

Did you know that antispyware programs like Webroot Spysweeper and Trend Micro Antispyware and the free Microsoft Windows Defender have real time active shields that block all “drive by” threat installations at all sites – not just “the bad ones – Restricted Sites” ?

This is what those that run donate forums and repair shops do not tell you so that they continually derive profit at the expense of the unknowing consumer. It is very simple – for 30 dollars a year you are good to go. End of story. Do it and dump it now before you injure your machine.

THE FRAUD OF THESE UTILTITIES

FACT – WELL OVER 25 BILLION WEBPAGES ……
World Wide Web
http://en.wikipedia.org/wiki/World_Wide_Web
Statistics
A more recent study, which used Web searches in 75 different languages to sample the Web, determined that there were over 11.5 billion Web pages in the publicly indexable Web as of the end of January 2005. As of March 2009, the indexable web contains at least 25.21 billion pages.

These products claim to….
“secures browser against dangerous sites and their unwanted malware” and explain their features as “preventing installation of spyware and other unwanted software, exploitation of security vulnerabilites, …”
IS THE FANCY DECEPTIVE WAY OF SAYING……
The product enters the entire list to date they have compiled as bad content websites and/or webpage addresses into Restricted Sites CREATING AN INDIVIDUAL REGISTRY KEY FOR EACH “DEFINTION” UPDATE FOR EACH WEBPAGE OR WEBSITE DOMAIN – one Windows Regsitry Key for each “automatic update” — and CONTINUALLY as new ones emerge, which is the activity of professional industry antivirus and antispyware companies attend continually to block threats from ALL.

NOW a collection of webpages makes up the website. Each website is a domain such as microsoft.com and is called the microsoft.com domain. If we use a simple number like most of the sites will use 10 webpages and divide that into the 25 Billion number of webpages plus – we can chop it down to 2.5 Billion Websites as very general. If we take just one percent of those as malicious content bad websites THEN these utiltiies claiming protection must have in the neighborhood of 25 Million bad domains out here as defintions in your computer or it is fraud and we just read this is physically impossible because of registry size.

CONCLUSION AS FAKE PRODUCT …… REMEMBER THEY SAY THEY “WILL PROTECT” AS ADVERTISING FOR DONATIONS….

So the defintions needed to support their claims of protection then has to be in the same ballpark as the 25 million bad websites added as Restricted Sites by their utilities. Now remember we just read at Microsoft that the Windows Registry has a 200M (million bits) size restriction. Now they are talking they are going to insert 25 million multi letter name domain words in the least, as new registry keys to fulfill their advertising and donation requests when in reality it may be in the hundreds if that.

So it is a compound or double deception. Number one, they have not possibly attained their advertised protection as they would have to have a minimum of at least in the tens of millions of known bad sites in their “Updates”, which are not updates at all but simply a new list of additional bad sites added to Restricted Sites.

And two, if they did as advertisied – simply the computer would cease to function from ‘incremental damage to the registry” – exceeding the “Registry Size Limit”.

FURTHERMORE…. If you don’t believe this – play this mediacast showing that the Restricted Sites does not even work ! …. (Webmaster of http://pdamobileCLOSEDcafe.net/ )
“Reticted Sites Circumvented – Does Not Block Successfully”
http://pdamobilecafe.net/CLOSED2010/04/27/reticted-sites-circumvented–does-not-block-successfully.aspx

POINT OF THIS EXERCISE – ? …..
WE DO NOT PROMOTE FEEL GOOD IN-SECURITY AND KNOW HOW DUMB YOU MAY FEEL RIGHT NOW AS WE DID WHEN WE WERE NEWBIES AND WENT TO THE SAME PLACES AND DOWNLOADED THE SAME FREE STUFF YOU ARE DOING. THE POINT OF THIS EXERCISE IS TO WAKE UP TO REALITY AND GET HIGH QUALITY PROFESSIONAL PRODUCTS THAT ACTUALLY PROTECT YOUR COMPUTER AND LIFE (ID THEFTS) A.S.A.P. ! ! !

Webmaster,

BLOG ENTRY:
http://blogcasts.bluecollarpc.orCLOSEDg/2010/05/23/restricted-sites-utilities-softwares-fraud-potentially-damaging-to-windows-registry.aspx
 

About Software Utilities Adding Restricted Sites lists to the Registry

THIS IS ABOUT USING RESTRICTED SITES UTILTITIES FOR “BROWSER IMMUNIZATION” OR “BLOCKS POTENTIALLY UNWANTED SPYWARE AND OTHER UNWANTED SOFTWARES” etc.

THIS EXPLAINS WHY THEY ARE A SCAM AND DAMAGING TO COMPUTERS AS WILL EVENTUALLY DESTROY THE COMPUTER SYSTEM RENDERING IT INOPERABLE

ASIDE FROM THE FACT THAT THIS BROWSER SOFTWARE SETTING ENTERS A REGISTRY KEY FOR EVERY WEBPAGE OR SITE BLOCKED AND HAS BEEN CIRCUMVENTED BY MALWARE – WE WILL START HERE WITH THE FACTS THAT CONTINUAL ENTRIES INTO THE WINDOWS REGISTRY WILL DESTROY THE SYSTEM MAKING IT INOPERATIVE…..

YOU MOST LIKELY THINK THEY ARE SOME MAGIC WAND OF PROTECTION — HERE IS ALL THEY DO AS “IMMUNIZATION” OR “PROTECTION” FOR DONATION MONEY…….
How to use security zones in Internet Explorer
http://support.microsoft.com/kb/174360
Restricted Sites Zone
“This zone contains Web sites that you do not trust. When you add a Web site to the Restricted Sites zone, you believe that files that you download or run from the Web site may damage your computer or your data. By default, there are no Web sites that are assigned to the Restricted Sites zone, and the security level is set to High.”
Generally the registry value added is “4″ from 0-4 SEE:   HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionInternet SettingsLockDown_zones4
SO THAT ONE KEY WILL BE ENTERED BY THEM FOR EACH BAD SITE THEY ADD TO UPDATE DEFINTIONS…..EXAMPLE:

EACH SITE ADDRESS MUST BE ENTERED HERE AS A “RETRICTED SITE” …..
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet
SettingsZoneMapDomains

EXAMPLE…. We are placing “adult.com” in Restricted Sites to show the key made immediately and written into the Windows Registry (adult.com as example here to block underage users on same PC – not saying it is a bad site at all)
HERE IS THE KEY IMMEDIATELY WRITTEN INTO THE REGISTRY TO BLOCK BROWSER ….
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet SettingsZoneMapDomainsadult.com

What Professionals and Experts say…..

You will see below a Professional explanation and why registry cleaners are used to prevent damage to Windows and/or softwares. Whereby certain utilities may add lists of sites and domains – this can be an exact example of “incremental entries” by softwares, or manually, into the Registry constantly per “definitions” Updates (lists of ‘bad’ domains added)….

Product Incrementation of Windows Registry –
Windows Registry Size Limits
http://www.liutilities.com/products/registrybooster/faq/registrycleaner/

“Fragmentation is a serious problem and occurs when application processes modify the registry continually and incrementally .
Eventually registry file sizes may exceed the Registry Size Limits imposed by Windows. This causes subsequent modifications to the registry to fail. Most registry repair software allow you to defrag your registry ensuring that such issues do not occur. This is true prevention.”

…..the constant inordinate or unusual ‘incrementation’ of constantly adding Restricted Sites and domain entries in great mass volume offers no real protection – as malware circumvents the Restricted Sites feature of any browser anyway – and as explained will lead to failure of software running processes and application design as well as the Windows Operating System.

The Windows Registry has an imposed size limit. When this is approached and to succession – Windows will fail to operate as well as other software that relies on normal incremental changes such as definition updates to antivirus and critical Windows Updates as prime example.

What is bottom line is, actually Windows can cease to function at some point of additions to the Windows Registry just like regular hard drive memory runs out at some point of continual downloads of files, media, etc.

SEE: Microsoft – Windows Registry Size Limits Imposed
Below are the Experts and creators of Windows facts….

Windows Registry Size Limits Imposed / Microsoft…
http://msdn.microsoft.com/msdnmag/issues/01/12/XPKernel/
There is a limit on the size of the System hive (the file that stores the HKEY_LOCAL_MACHINESystem key and its descendants) of 200MB, because of restrictions placed on the operating system boot loader by the environment in which it runs (the boot loader reads the System hive into memory very early in the boot process), but the limit for the System hive was just 12MB in previous versions of Windows…..

MORE:
Registry Size Limit functionality has been removed from Windows Server 2003 and from Windows XP
http://support.microsoft.com/kb/292726
Windows Registry Size Limits
http://msdn2.microsoft.com/en-us/library/ms724872.aspx
Registry Size Limit
http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/r

Don’t listen to hackers – and this is extremely crucial with all systems released before Windows XP. The XP size limit was increased but has an imposed Size Limit by Microsoft. Some say “don’t worry about it”… and those are just the persons you remember when your computer fails. Too late then.

Hackers may tell you to set up “registry folders” for Windows 98 and 95 to place these downloads (lists) in that would save or add registry room which would be preposterous. Hackers will tell you if and when you run out of room in XP you can “increase the paged pool size – no problem”. Neither of these work or are true – and are bad hacks and they may be intentionally attempting these malicious pranks at your expense to destroy peoples machines like the “kiddie script” malware writers for “bragging rights” achieved. DUMP IT !

Did you know that antispyware programs like Webroot Spysweeper and Trend Micro Antispyware and the free Microsoft Windows Defender have real time active shields that block all “drive by” threat installations at all sites – not just “the bad ones – Restricted Sites” ?

This is what those that run donate forums and repair shops do not tell you so that they continually derive profit at the expense of the unknowing consumer. It is very simple – for 30 dollars a year you are good to go. End of story. Do it and dump it now before you injure your machine.

THE FRAUD OF THESE UTILTITIES

FACT – WELL OVER 25 BILLION WEBPAGES ……
World Wide Web
http://en.wikipedia.org/wiki/World_Wide_Web
Statistics
A more recent study, which used Web searches in 75 different languages to sample the Web, determined that there were over 11.5 billion Web pages in the publicly indexable Web as of the end of January 2005. As of March 2009, the indexable web contains at least 25.21 billion pages.

These products claim to….
“secures browser against dangerous sites and their unwanted malware” and explain their features as “preventing installation of spyware and other unwanted software, exploitation of security vulnerabilites, …”
IS THE FANCY DECEPTIVE WAY OF SAYING……
The product enters the entire list to date they have compiled as bad content websites and/or webpage addresses into Restricted Sites CREATING AN INDIVIDUAL REGISTRY KEY FOR EACH “DEFINTION” UPDATE FOR EACH WEBPAGE OR WEBSITE DOMAIN – one Windows Regsitry Key for each “automatic update” — and CONTINUALLY as new ones emerge, which is the activity of professional industry antivirus and antispyware companies attend continually to block threats from ALL.

NOW a collection of webpages makes up the website. Each website is a domain such as microsoft.com and is called the microsoft.com domain. If we use a simple number like most of the sites will use 10 webpages and divide that into the 25 Billion number of webpages plus – we can chop it down to 2.5 Billion Websites as very general. If we take just one percent of those as malicious content bad websites THEN these utiltiies claiming protection must have in the neighborhood of 25 Million bad domains out here as defintions in your computer or it is fraud and we just read this is physically impossible because of registry size.

CONCLUSION AS FAKE PRODUCT …… REMEMBER THEY SAY THEY “WILL PROTECT” AS ADVERTISING FOR DONATIONS….

So the defintions needed to support their claims of protection then has to be in the same ballpark as the 25 million bad websites added as Restricted Sites by their utilities. Now remember we just read at Microsoft that the Windows Registry has a 200M (million bits) size restriction. Now they are talking they are going to insert 25 million multi letter name domain words in the least, as new registry keys to fulfill their advertising and donation requests when in reality it may be in the hundreds if that.

So it is a compound or double deception. Number one, they have not possibly attained their advertised protection as they would have to have a minimum of at least in the tens of millions of known bad sites in their “Updates”, which are not updates at all but simply a new list of additional bad sites added to Restricted Sites.

And two, if they did as advertisied – simply the computer would cease to function from ‘incremental damage to the registry” – exceeding the “Registry Size Limit”.

POINT OF THIS EXERCISE – ? …..
WE DO NOT PROMOTE FEEL GOOD IN-SECURITY AND KNOW HOW DUMB YOU MAY FEEL RIGHT NOW AS WE DID WHEN WE WERE NEWBIES AND WENT TO THE SAME PLACES AND DOWNLOADED THE SAME FREE STUFF YOU ARE DOING. THE POINT OF THIS EXERCISE IS TO WAKE UP TO REALITY AND GET HIGH QUALITY PROFESSIONAL PRODUCTS THAT ACTUALLY PROTECT YOUR COMPUTER AND LIFE (ID THEFTS) A.S.A.P. ! ! !

————–

BLUECOLLARPC.US BLOGPOST

Many times asked “Best Easiest Free Registry Cleaner/Fixer

http://bluecollarpc.us/2011/03/10/many-times-asked-best-easiest-free-registry-cleanerfixer/

By bluecollarpcLast updated: Thursday, March 10, 2011 – Save & ShareLeave a Comment

Many times asked “Best Easiest Free Registry Cleaner/Fixer….

Our Answer…

Whole list here… http://bluecollarpc.us/windowsregistry.php
Uniblue Registry Cleaner Comparison Chart
LINKS/Soure: http://www.liutilities.com/products/registrybooster/comparisions/

For free the two best in the world are ….

(ADVANCED)
RegSeeker 1.55:
http://www.hoverdesk.net/freeware.htm
RegSeeker is a perfect companion for your Windows registry !
RegSeeker includes a powerful registry cleaner and can display various informations like your startup entries, several histories (even index.dat files), installed applications and much more ! With RegSeeker you can search for any item inside your registry, export/delete the results, open them in the registry. RegSeeker also includes a tweaks panel to optimize your OS ! Now RegSeeker includes a file tool to search for duplicate files, bad shortcuts
and more ! RegSeeker is FREE for personal use only !

GREAT FOR NOVICE AND ADVANCED – ALL …. (Use safest user settings)
RECOMMENDED:
PowerTools Lite – The Freeware Registry Cleaner
http://www.macecraft.com/ptlite/
Key Features

•Detects and fixes registry errors
•Finds and cleans unneeded registry junk
•Finds leftover temp files
•Clears History and MRU data
•Safe to use – automatic backup feature
•Multilingual user interface
•Based to the same award-winning engine as jv16 PowerTools

jv16 PowerTools by Macecraft has been consistently about the world’s best for a decade. Very, very, very well known by power users and that trusted. Costs bucks, however, they recently have given back to the community by releasing their Free Home Version no catches for real for all users. It has like four different settings of intensity for cleaning/fixing. Use simply the safest and at most one more click up in a scan/fix. Very fast, very safe. Best !

Also has back up one click button to restore anything deleted. You may want to get a little more familiar, but you can perform the full Registry Back Up BEFORE proceeding to ANY changes by opening the Windows Registry and make a COPY of it before change that can reinstall the full registry in a click.

HowTo….
Click > Start > Run and type in “regedit” without the parenthesis.
This opens the Windows Registry and don’t dare touch anything or you can render Windows/other softwares inoperable by a mistake !
NOW Click > File > Export…. (top left tabs). It will open the dialouge as if you were saving a file or media or software. NAME the file you wish to call it like “Reg_Back_up_Today” or anything you wish to call it so you remember and then Click > Save ….and usually to My Documents.
NOW WAIT about 30 to 60 seconds as it will then copy the ENTIRE Registry to the restore file. It can take even up to 90 seconds if ypou havea lot of stuff installed. Hover your mouse cursor over it to see progress. DO NOT DARE INTERRUPT THE PROCESS UNTIL COMPLETED !!! or you may cause dreaded Registry Damage ! Do NOT mess up with impatience or doubt !

IF USED TO RESTORE THE REGISTRY… you Double Click the Registry back up file created and DON’T DARE INTERRUPT THE PROCESS and can take even up to five minutes for it to rewrite in the Registry.

Note, after any changes to the PC you need to Export the Registry again in a new back up file to restore to current state of the PC such as new softwares added etc. Recommended to do this like weekly or monthly as how many times in a lifetime will this ever need to be done. Every blue moon – but you need the back up like to restore the computer if hit by malware plus files back up correspondingly.

Source(s):
http://bluecollarpc.us/windowsregistry.php

Webmaster, http://BlueCollarPC.US

 

FURTHERMORE READ THIS WHICH INCLUDES INFORMATION ABOUT MODERN REGISTRY CLEANERS THAT SEVERAL YEARS AGO WERE UPGRADED TO NOW ALSO PERFORM REGISTRY DEFRAGMENT TO HEAL REGISTRY FRAGMENTATION THAT OCCURS IN NORMAL USE AND WORSE IN HEAVY USE UNATTENDED…..

 

Why You Should Defragment Your Registry

http://www.maketecheasier.com/why-you-should-defragment-your-registry/2008/01/29

QUOTED:

The Need to Defrag the Windows Registry

If you monitor the registry of your system using a tool, you will see that it is accessed by your Windows operating system and programs installed on it more than a hundred times every second. Therefore, if your registry is fragmented and slow in responding to requests for information, it directly affects the performance of your PC and slows it down. This is the reason why it is important for you to keep your registry free from unwanted files and defrag it regularly to speed up your PC and maintain it at its optimal performance.

Causes for Registry Fragmentation

The registry is one of the most used components of your Windows system because it comprises configuration data of all hardware devices and software programs installed on your PC. Therefore, each and every operation that occurs on your system adds or removes information from the registry. Most of the time, when these entries are no longer required, they are removed from the registry. However, in reality, a lot of information gets left behind causing the registry to bloat up. This registry bloating eventually fragments and damages the registry files.

Registry files also get fragmented due to the accumulation of several empty registry keys within it. These keys are generated when the registry entries that are removed from the registry fail to remove their placeholders. In due course, the number of these empty registry keys increases in the registry and causes registry fragmentation.

How to Defrag the Registry

There is no tool available in your Windows system that you can use to defrag the registry. Therefore, the only way to defrag it is by using a reliable third-party registry cleaner tool. Today, there are a large number of registry cleaner tools available in the market today. You must choose and download the one that meets your requirements, carries good user reviews and is compatible with your operating system.

Registry tools are easy-to-use and enable you can defrag the registry easily in just a few mouse clicks. When you start the registry defragment process, your registry tool consolidates all the fragmented registry files, reindexes them to improve the data access time, and removes all empty registry keys to compress the registry.

When To Defrag the Registry

Because the registry defragmentation process enables you to remove empty registry keys, you must defrag the registry after you have performed any activity that removes a lot of entries from the registry.

For instance, after you clean up the registry using the registry scanner tool, all the invalid keys removed leave behind their empty place holders. In the same way, empty keys may get left behind when you uninstall applications from your PC. So, even if you would have removed all unwanted information from the registry—or uninstalled an application, the size of the registry may remain the same due to the existence of these empty registry keys. This is the reason you may always defragment the registry after registry scan and repair and program uninstall processes.

The registry is an important component of your Windows system and it is important for you to perform regular registry maintenance to ensure yourself a healthy, high-performance PC. You can do this easily using your registry cleaner tool. In addition to repairing registry errors and defragging the registry, you may also use the tool to backup the registry. It is quite useful to make regular registry back-ups, because if despite of all your maintenance activities the registry fails, you can easily restore it using the back-up you would have taken earlier.

This article is a guest post by James Ricketts

James Ricketts is a full time writer who loves to write about the errors, solutions, and various tips, tweaks, and nuances of the Windows Vista and XP registry. With his background in computers and writing he’s blended both his talents into writing helpful articles relating to various Windows and computer issues

http://www.maketecheasier.com/why-you-should-defragment-your-registry/2008/01/29

FURTHERMORE… ROOTKITS SEARCH FOR LEFT OVER FILES AND REGISTRY KEYS FROM UNINSTALLS TO USE THEM TO HIDE BEHIND TO AVOID DETECTION AND THESE ORPHAN FILES AND KEYS ARE SOMETIMES CALLED POTENTIAL SLEEPER FILES AND KEYS.

Homepage and search changed mysteriously?

Homepage and search changed mysteriously?

Has your Homepage and chosen default search engine changed mysteriously? You may have even tried to change them back but they keep going to the new one?

 

The culprit is the usual suspects – malware. Here are the examples of what does this…. (sometimes an installed toolbar suddenly appears that you did not install or you may have installed a bad malware toolbar that changed settings to theirs)….

 

Browser Hijackers
http://en.wikipedia.org/wiki/Browser_hijacker
http://www.microsoft.com/protect/terms/hijacking.aspx
http://us.trendmicro.com/us/threats/enterprise/threats-summary/browser-hijackers/

Browser Hi-Jackers BHO
http://en.wikipedia.org/wiki/Browser_Helper_Object

Page hijacking
 http://en.wikipedia.org/wiki/Page_hijacking

DANGER: These may set a new homepage and it may be a malicious website that just visiting it, or any link on it, will infect the system even worst with viruses, worms, trojans, or install spyware etc etc etc.

 

RECOMMENDED…
You may first want to install antimalware (antivirus plus antipsyware) and then run a scan for infections. These will detect them and quarantine them – placing them in a special quarantine section to prevent them from further infecting and ongoing infection –  and they safely repair any files or software infected simply by stripping the bad malware code from them automatically in the bat of an eye.

Try installing antimalware with Real Time Protection that PREVENTS these infections from ocurring in the first place and you can add some free home version extra scanners that may get what is missed….

 

Microsoft Security Essentials
http://www.microsoft.com/security_essentials/
“Provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software. Microsoft Security Essentials is a free* download from Microsoft that is simple to install, easy to use, and always kept up to date so you can be assured your PC is protected by the latest technology. It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple. Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without interruptions or long computer wait times.”

Free Internet Security and Free Antivirus from Comodo
http://www.microsoft.com/security_essentials/
Best free antivirus software with complete protection, Download free antivirus software now to make your PC 100% safe and secure, top rated free antivirus from comodo

 

Add….. any of these…. FREE home versions

Lavasoft Ad-Aware
http://www.lavasoftusa.com/software/adaware/

SUPERAntiSpyware
http://www.superantispyware.com/

Malwarebytes
http://www.malwarebytes.org/

Patch Coming Tuesday – Internet Explorer 8 Zero-Day

Patch Coming Tuesday – Internet Explorer 8 Zero-Day

 

FOLLOW UP…..

As a follow up, there is the expected patch coming for the discovered Internet
Explorer 8 Zero-Day security hole being exploited by malware bad guys.

 

SEE LINK:
Microsoft Patch Tuesday To Include Critical Internet Explorer Fix
http://www.crn.com/news/security/240154549/microsoft-patch-tuesday-to-include-critical-internet-explorer-fix.htm

 

Microsoft did not release an anticipated Out-Of-Cycle Emergency Patch as perhaps
the timing just brought it right to the normal Patch Tuesday of Windows Updates,
which is the normal second Tuesday of each month.

NOTES:
Remember if you did apply the Microsoft Fix It for IE8 that you may want to
return and uninstall this before applying the appropriate Windows Updates due
Tuesday.

You can find the link here in a brief write up here….

Where to find Microsoft “Fix It” for Internet Explorer 8 zero day fix
http://bluecollarpc.us/2013/05/11/where-to-find-microsoft-fix-it-for-internet-explorer-8-zero-day-fix/

 

In Vista things changed as far as Windows stuff in the old Add/Remove Programs
in previous Windows XP. You do not see these in Programs and Features where
installed softwares are listed for performing Repair or Uninstall. If you
upgraded to IE9 (Internet Explorer Version 9) – you can uninstall it at the
Windows Updates section and then install IE8 from the Microsoft download site.

 

Webmaster,
http://bluecollarpc.us/

%d bloggers like this: