Have you disabled UPnP in your Router yet? Security Hole

Have you disabled UPnP in your Router yet? Security Hole

This is very simple to do. Check out the How-To Geek link here…

HTG Explains: Is UPnP a Security Risk? – How-To Geek
http://www.howtogeek.com/122487/htg-explains-is-upnp-a-security-risk/
Aug 24, 2012 – UPnP comes enabled by default on many new routers. At one point, the FBI and other security experts recommended disabling UPnP for …

How to fix the UPnP security holes | ZDNet
http://www.zdnet.com/article/how-to-fix-the-upnp-security-holes/
Jan 30, 2013 – The US Department of Homeland Security is urging everyone to disable the common networking Universal Plug and Play (UPnP) protocol….

What is UPnP? A Webopedia Definition
http://www.webopedia.com/TERM/U/UPnP.html
This page describes the term UPnP and lists other pages on the Web where you can find additional information…

Universal Plug and Play – Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/Universal_Plug_and_Play
Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi …

Advertisements

Free Security Stuff Worth It? Complete Package Recommended Here Is!

Free Security Stuff Worth It? Complete Package Recommended Here Is!

NOTE: I am/was Webmaster of the BlueCollarPC .net/.org/.us [all retired] now at permanent BlueCollarPC Security Helper Google Site https://sites.google.com/site/pcsecurityhelper/
Since 2005 we have been graced to help over 12 Million User/Visitors and have maintained honest free best information sharing with integrity expected by the Community at such Help Sites across the web, as expected and demanded. For continual help and information ongoing, stop into our site anytime and even find more stuff to use ! HOME: https://sites.google.com/site/pcsecurityhelper/

You wanted a free package, here you go. A Good Free Package of Security Softwares you can add FREE FREE FREE!

BUT READ THIS FIRST FIRST FIRST !!!!

You will have to understand what is said here. The reasons over 12 million Users/Visitors of my security site trust it/me is that I have always maintained the honesty of NEVER giving bad advice as unresearched and proven. NEVER posting links that lead to malicious infectious websites. NEVER posted any softwares that were bundled with malware or that were other than “Genuine Freeware” – which is the term I invented as meaning no continual or intermittent pop ups or ads or connected to any ad networks or “nagware” they now call it. Of course it is understood that “trialware” is known that it is a free version for a set time that maybe one week, fifteen or thirty days. I have NEVER promoted any “feel good” false sense and environment of computer security – which many commercial sites do for gain such as online magazines etc. One of our Creeds……

“NOTES…..
FUD “Fear, Uncertainty and Doubt, a marketing or political strategy” …
FUD (definition) http://en.wikipedia.org/wiki/FUD
There are many, many idiots and the corrupt in computer security calling all things FUD (or snake oil – worthless product, does nothing – such as industry wide security products as antivirus, antispyware, personal firewalls etc.) . Some of the count are actual cyber criminals socially engineering you ! Some advocate never using a registry cleaner (which can not pass legal compliance in IT Security) – yet they will advise you to use antivirus and antispyware that does indeed remove malware Windows Registry keys. We as intermediate and advanced users have known for years and have used for years Registry products that are an invaluable help to manually locate malware items and as well identify reported malware by security products (antivirus. antimalware, firewalls). These others are telling you ‘feel-good’ false security lies as ‘sugar daddies’ or ease-of-use ‘candy man’ tactics to be your “security guru” at many forums. We do not promote any false sense of security or environment. Those wishing to profit from calling security FUD are what we use to call Judas Iscariot and are NOT welcomed here or anywhere there is intelligence. ”

Originally, a “free package” as a handful of security softwares put together as “layers of security” used to be posted by just about all helpers. BUT this was the early days from 2002 on a few. Many products were not near 100 percent protection (antispyware) so it began to then download some extra free versions as stand alone on demand scanners without Real Time Protection activated (but upon purchase). These were added to one you would buy. What one didn’t get – the others would was the logic and advice. You put together your “security solution”.

This dramatically changed forever now and is no longer good advice to any user. The reason is that the cyber crime threatscape changed for the worst years ago. First they added to payloads malwares that would disable ANY free version on the computer. They could not be used. Then they also added malwares that would attack a paid version on the computer as not all antivirus/antispyware products were best quality that repelled easily these attacks upon them to disable them. Weaker or less than quality premium version (pay for) antimalware products (antivirus and antispyware) were successfully attacked and disabled by the newer malware payloads, which then installed at will the rest of their payloads being successful to disable security products – that would be trojans, spyware, rootkits, viruses, etc.

Here is just one example of this as a common threat nowadays (zillions) :
Security software disabler Trojan
http://www.webopedia.com/TERM/S/security_software_disabler_Trojan.html
Through less than quality firewalls like butter….
Tunneling to circumvent firewall policy
http://en.wikipedia.org/wiki/Tunneling_protocol#Tunneling_to_circumvent_firewall_policy
“Users can also use tunneling to “sneak through” a firewall, using a protocol that the firewall would normally block, but “wrapped” inside a protocol that the firewall does not block, such as HTTP. If the firewall policy does not specifically exclude this kind of “wrapping”, this trick can function to get around the intended firewall policy.”

So in good conscience, there is no way to give the older advice of building some free package of security softwares and tell someone they are good to go. It is now plainly a LIE !!! And big BUT…. There are so many that do not have credit cards to buy products online. There are those that simply will not pay for protection like your thrifty Uncle example. So with these – they still need anything as beating a blank. It HAS to be drilled into their heads that a free version is only a scanner with NO protection and the pay product is necessary for Real Time Protection. This is Reactive and Proactive Security. Reactive security is using free scanners like AVG Free etc. with no Real Time Protection and are used AFTER a threat to the PC is perceived by the user. You scan and attempt to detect any threats and remove them. However, the damages are ALREADY done such as a destructive worm or virus and spyware as well, that all files they wished to get have already been copied and sent to the cyber criminals. TOO LATE NOW ! Proactive is using the product with Real Time Protection running 24/7. This BLOCKS infections before they occur – thus NO loss of personal data and/or actual destruction of the operating system or motherboard or chipsets or disk itself leaving the PC “bricked” – like a brick, doesn’t do anything and makes for a paperweight now. (Bricked is generally the term they use for mobiles toasted by malware).

There are just the FEW free products that offer Real Time Protection. If they refuse to pay or can’t, you have to then offer the “free package” and wish them good luck with the instructions to them about dangers. The free ones with Real Time Protection (heuristics) are simply no where near any best product is the problem aside trying to get something for free. You get what you pay for is the advice and of course you explain and add “Best Practices” advice for safe surfing as best possible (stay away from dark side of internet which is full of infections, etc) and not opening or clicking spam emails or attachments etc.

Having all this in mind, and not simply listing a package as my advice without explanation in full above (what I put my hand to), let’s go ahead and put together that free package…..

FIRST the user needs a product with Real Time Protection. This is ALWAYS the first move/installation.
BEST FREE:
Comodo Free Anti Virus Software Internet Security
http://antivirus.comodo.com/ (Genuine Freeware)
Free Antivirus Software from Comodo eliminates viruses, spyware, and other malware from desktops and networks fighting against Internet security threats. Full Real Time Protection !
PRESS: Great News !
Comodo Internet Security Earns the Prestigious VB100 Virus Certification
HostReview.com (press release) April 14, 2011
http://www.hostreview.com/news/110414-comodo-internet-security-earns-prestigious-vb100-virus-certification

NEXT: (may be tad advanced for newbie)
Spyware Terminator [Genuine Freeware] (Antispyware and antivirus. Real time protection added!)
http://www.spywareterminator.com/
Millions of users worldwide rely on Spyware Terminator, winner of many awards and high ratings from industry experts and users. Its free comprehensive protection is comparable to competitors’ paid versions! Originally with enterprise level Clam Antivirus now has F-Prot Antivirus.
Spyware Terminator includes: http://www.spywareterminator.com/
* Fast spyware scanning
* 100% real-time protection
* HIPS protection
* Antivirus protection
* Multilanguage Support
http://www.spywareterminator.com/
View List of All Features »
http://www.spywareterminator.com/features/antispyware-features.aspx

LAST PLACE:
Microsoft Security Essentials…..(only recommended for Real Time Protection and is now very weak product)
http://www.microsoft.com/security_essentials/
Microsoft Security Essentials provides real-time protection for your home PC, antivirus and antispyware real time shields.

SPECIAL NOTE / BASIC SECURITY….Microsoft: Security Essentials is designed to be bottom of the antivirus rankings. Microsoft has admitted Windows users should install antivirus above and beyond its own Security Essentials, describing its protection as merely a “baseline” that will “always be on the bottom” of antivirus software rankings.
http://www.pcpro.co.uk/news/security/384394/microsoft-security-essentials-is-designed-to-be-bottom-of-the-antivirus-rankings

HOWEVER it must be explained…. Generally, Do not use two antimalware products that have real time protection technology. These generally will conflict and worst. You can use these with free stand alone products that just scan, safely. DO NOT INSTALL ALL THREE OUT OF PARANOIA!!!! Pick one only that has Real Time Protection. These are that Proactive Defense.

BEST FREE STAND ALONE SCANNER – SCAN ON DEMAND (means open it and click scan)…..
Emsisoft Antimalware
http://www.emsisoft.com/en/software/antimalware/
Full antivirus and antispyware combined. This is the best premium product in the world IMO (In My Opinion) beating all others as Norton, ESET NOD32, Sophos etc. Download it and choose either full version free for 30 days to try, or simply click Free Version (without Real Time Protection). With one of the above Real Time Protection products, you can then use the Emsisoft free version to perform a full scan at least once a week. Heavy surfers – scan every or every other day! Great scan options, you can do the quick scan check for malware running right now on the PC (think you may got hit at a site) which takes only a moment. You can choose Smart Scan which checks the usual suspects in the usual places. And then Full Scan which will scan the entire computer system and files. This takes over a half hour with any product, the full scan, but should be done even by advanced users at least once a week or bi-monthly.
http://www.emsisoft.com/en/software/antimalware/

ALSO GET THIS TOO FOR USB DRIVE / USE IF PC IS LOCKED UP, CAN’T NAVIGATE – JUST PLUG IN AND LAUNCH EEK AND SCAN
Emsisoft Emergency Kit 2.0 [genuine freeware, best, recommended]
http://www.emsisoft.com/en/software/eek/
Your emergency kit for infected PCs! Detects and removes Malware > 5 million known dangers. World class dual-scan-engine. 100% portable – perfect for USB sticks. HiJackFree and BlitzBlank included. Self made Emergency USB Drive stick (or purchase) – Expand the content of the Emsisoft Emergency Kit to an USB stick and make your own universal tool to scan and clean infected PCs.

MORE …

ANTIVIRUS:
Avast AntiVirus Home Edition [working-freeware]
http://www.avast.com/eng/avast_4_home.html
Free avast! 4 Home Edition. avast! 4 Home Edition is a full-featured antivirus package designed exclusively for home users and non-commercial use.

BitDefender Free Edition
BitDefender Free Edition is an on-demand virus scanner, which is best used in a system recovery or forensics role. If you are on an “always-on” Internet connection, we strongly advise you to consider using a more complex antivirus solution.
http://www.bitdefender.com/PRODUCT-14-en–BitDefender-Free-Edition.html

AVG – Free Antivirus
http://www.avg.com/us-en/free-antivirus-download
AVG Anti-Virus Free is virus and anti-spyware available for free.

ANTISPYWARE:

SUPERAntiSpyware [working-freeware version]
http://www.superantispyware.com/
SUPERAntiSpyware scans your computer for known Spyware, Adware, Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers and many other types of threats, and allows you to remove or quarantine them. The free version lacks real-time blocking and protection as well as several other advanced options.

Lavasoft Ad-Aware [working-freeware version]
http://www.lavasoftusa.com/software/adaware/
Ad-Aware Personal provides advanced protection from known data-mining, aggressive advertising, Trojans, dialers, malware, browser hijackers, and tracking components. This software is downloadable free of charge for personal use. (Lavasoft Ad-Aware is one of the pioneers in antispyware as we know it today along with Webroot Spysweeper)

Malwarebytes [working-freeware version]
http://www.malwarebytes.org/
Free anti-malware (Has become popular, detection rates have greatly improved ! )

INSTALL QUALITY FIREWALL ASAP! (Microsoft includes a basic firewall now in all editions)
ZoneAlarm Free Firewall (BEST FREE – SET AND FORGET!]
Protect your PC with #1 Free Firewall
http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm

Comodo Personal Firewall [tad advanced for newbies]
(Genuine Freeware, and rated by international tests as about world’s best – now includes antivirus real time)
http://www.personalfirewall.comodo.com/

***Now there is a free security solution with even more to add, below a couple more tools. You get antimalware with Real Time Protection installed for real time protection and then add the free scanner versions to get what that misses – both antivirus and antispyware. With the free scanners, you can download/install all of themwill not conflict with the Real Time Protection product (Comodo etc) installed.

SECURITY TOOLS / UTILITIES

Internet Tracks Cleaners Recommended (Privacy and Security)
CCleaner – Wikipedia, the free encyclopedia (very popular, safe, freeware/donate)
CCleaner supports the cleaning of temporary and unneeded files from certain …
http://en.wikipedia.org/wiki/CCleaner
CCleaner http://www.ccleaner.com/
NOTE FOR AVERAGE USER SETTINGS PLEASE SEE THESE ON MY BLOGPOST HERE:
https://bluecollarpcwebs.wordpress.com/2012/01/14/recommended-settings-and-use-of-ccleaner-temparary-internet-files-clean-up-browsers-applications/
[You should have browsers Settings to delete all internet history each time it closes. Do NOT keep cookies on your computer at all. They have been broken into by crimewares now. Cookies should only be given session cookies permissions as a privacy and security issue (cookies have been broken into by malwares) and only if necessary.

Secunia Personal Software Inspector (PSI) [MILLIONS OF DOWNLOADS]
The Secunia PSI is a free security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Set to automatic or manual Update for all, will not install the purchase Upgrade versions – just Updates released by the software companies.
http://secunia.com/vulnerability_scanning/personal/

ESET (NOD32) Stand-alone malware removal tools
http://kb.eset.com/esetkb/index?page=content&id=SOLN2372

ADD FOR FIREFOX….
BetterPrivacy :: Add-ons for Firefox
https://addons.mozilla.org/en-US/firefox/addon/6623
Remove or manage a new and uncommon kind of cookies, better known as LSO’s.The BetterPrivacy safeguard offers various ways to handle Flash-cookies set by Google, YouTube, Ebay and others… Go through Settings and click to always delete all when browser closes or paranoid – check to give permission to these on case to case basis.

EULAlyzer 1.1 [freeware]
http://www.javacoolsoftware.com/eulalyzer.html
EULAlyzer can analyze license agreements in seconds, and provide a detailed listing of potentially interesting words and phrases. Discover if the software you’re about to install displays pop-up ads, transmits personally identifiable information, uses unique identifiers to track you, or much much more.

RESET PC WHEN INFECTED AFTER CLEANING UP:
Microsoft Malware Prevention troubleshooter
http://support.microsoft.com/kb/2534555
The Microsoft Malware Prevention trouble shooter is designed to scan your computer and make recommended changes based on your current settings to provide you with the most up to date security for your Windows operating system. Building up your computer’s defenses helps secure your computer against viruses and other malicious software.

The Microsoft Malware Prevention troubleshooter does the following:
•Turns on your Windows Firewall. Enabling your Windows Firewall will protect your computer by blocking communication to your PC that may be malicious software.
•Antivirus software: Checks your Antivirus protection status. You will be prompted to update your Antivirus program if it is not up to date or enable Real-time protection. If you don’t have an anti-virus program installed it will offer you to use Microsoft Security Essentials or learn more about other security software partners.
•Turns on Automatic Update. Windows Update helps keep your PC current, secure and enhance performance by automatically downloading and installing the latest security and feature updates from Microsoft. This helps ensure that both Important and Recommended updates are downloaded.
•Pop-blocker: Enabling Pop-up Blocker will make browsing the web safer by helping prevent malicious or unsafe pop-ups from automatically appearing.
•Remote Registry: The Windows Remote Registry service enables remote users to modify registry settings on this computer. If this service is stopped the registry can be modified only by users on this computer as opposed to over the network.
•Internet Explorer: The package will inform you if you have the latest version of Internet Explorer installed. It will also modify your current privacy settings to ensure you have a safe browsing experience. The package will delete your internet cache and browsing history, which will help protect against malicious threats attempting to access your computer while you’re online.
•Enables User Account Control (UAC). User Account Control (UAC) will prevent malicious software from modifying your computer settings without your consent.
•Proxy Settings: If malicious software has modified your Internet Proxy settings, therefore making it difficult to get online, the package will reset your settings so you can browse the internet normally.

ADVANCED:

ProcessQuickLink [Genuine Freeware]
http://www.processlibrary.com/quicklink/
For your PC to function Windows needs to run and manage many different processes. While many processes run by Windows are essential and legitimate, most PCs get bogged down with processes that are useless or downright harmful. ProcessQuickLink gives you an easy way to analyze each process running on your PC. Is it a resource hog? Could it be part of a virus infection? Or maybe a sign of spyware? ProcessQuickLink will give you the answer. How it works….. Once you install ProcessQuickLink access the Task Manager. Near each process you will see an button. Click on the button and you will be linked to the process page as listed on processlibrary.com.

HiJackFree (freeware)
Freeware! HiJackFree helps advanced users to detect and remove Malware manually. With HiJackFree you can manage all active processes, services, drivers, autoruns, open ports, hosts file entries and many more. For your full control over your system.
http://www.hijackfree.com/en/

BEST MOST TRUSTED REGISTRY CLEANER:
PowerTools Lite – The Freeware Registry and System Cleaner
https://www.macecraft.com/slides/powertools-lite-2013/
PowerTools Lite 2011 is a freeware edition of jv16 PowerTools – the ultimate Windows optimization and tuneup utility suite. PowerTools Lite 2011 allows you to easily clean up your computer from unneeded data, unused temp files, registry left overs and automatically fix registry errors.
NOTE: jv16 PowerTools has been about the best registry cleaner loaded with extra advanced features including registry editor for years and years since the beginning. Recently over a year ago they released the above free edition which has four levels of intensity clean for beginner to advanced. Very safe. Very trusted .
PREMIUM jv16 PowerTools:
http://www.macecraft.com/
http://en.wikipedia.org/wiki/Jv16_powertools

Belarc Advisor (Freeware)
The Belarc Advisor builds a detailed profile of your installed software and hardware, missing Microsoft hotfixes, anti-virus status, …
ABOUT BELARC
http://www.belarc.com/about.html
Belarc, located in Maynard, MA, develops and licenses Internet based products which help make personal computers easier to use and maintain by large enterprises, small businesses and individual consumers. Our products are used for software license compliance, hardware upgrade planning, cyber security status, information assurance audits, IT asset management, configuration management, and more. Belarc’s products are in use on well over twenty million computers and are licensed by numerous customers including: AIG, Dana, Kindred Healthcare, NASA, National Park Service, U.S. Air Force, U.S. Army, U.S. Census Bureau, U.S. Coast Guard, U.S. Marine Corps, U.S. Navy, Unilever, WebMD/Emdeon, and many more.

Trend Micro RUBotted (free)
http://www.trendsecure.com/portal/en-US/tools/security_tools/rubotted
Malicious software called Bots can secretly take control of computers and make them participate in networks called “Botnets.” These networks can harness massive computing power and Internet bandwidth to relay spam, attack web servers, infect more computers, and perform other illicit activities.
Security experts believe that millions of computers have already joined Botnets without the knowledge of their owners. By using remotely-controlled computers, the criminals in charge of the Botnets try to remain anonymous and elude authorities seeking to prosecute them. RUBotted monitors your computer for suspicious activities and regularly checks with an online service to identify behavior associated with Bots. Upon discovering a potential infection, RUBotted prompts you to scan and clean your computer.

Reading Blue Screen of Death Codes
http://www.howtogeek.com/97093/ask-htg-reading-blue-screen-codes-cleaning-your-computer-and-getting-started-with-scripting/?utm_source=newsletter&utm_medium=email&utm_campaign=081111
Generally IRQL errors are hardware or driver related. We’d suggest
checking to see if any drivers have been updated recently and either
roll them back to the old driver or see if an even newer driver is
available (the vendor may have released a driver to fix the crashes). If
that doesn’t help you’ll find BlueScreenView, a crash dump analyzer,
rather helpful. We have a guide to using BlueScreenView to help get you
started……
BlueScreenView v1.40 – View BSOD (blue screen) crash information stored in dump files.
Copyright (c) 2009 – 2011 Nir Sofer
http://www.nirsoft.net/utils/blue_screen_view.html

GO PORTABLE! PUT TOGETHER PORTABLE SECURITY PACKAGE! I really recommend you install this for the USB Drive and then add the portable versions below….
GET: PortableApps.com software for USB Drive…. (has all kinds of portable apps listed you can install at will, plus you can check to get updates from each app (security updates, bug fix, etc) automatically or manually….
PortableApps.com
http://portableapps.com/
Provides packaged software suitable for use on portable media, without leaving settings files on the host computer. Includes developer information, discussion …

ADD SECURITY TOOLS PORTABLE APPS
Try clean up with portable products when access/download blocked or getting dreaded Blue Screen Of Death……

How to Remove Boot Block Malware
http://www.ehow.com/how_5941797_remove-boot-block-malware.html
Boot block malware is malicious software that settles into your computer’s hard
drive in the first sector and replaces the boot block instructions with malware
instructions. When you start, or boot up, your computer, the malware is loaded
into your computer’s memory and from there it can spread to any other part of
your computer. ….
http://www.ehow.com/how_5941797_remove-boot-block-malware.html

USE THE FOLLOWING TO REMOVE MALWARE – ROOTKIT/BOOTKIT BOOT-BLOCK TYPE MALWARES ….. EMSISOFT EMERGENCY KIT AND/OR MICROSOFT WINDOWS DEFENDER OFFLINE

Emsisoft Emergency Kit 2.0 [genuine freeware, best, recommended]
http://www.emsisoft.com/en/software/eek/
Your emergency kit for infected PCs! Detects and removes Malware > 5 million known dangers. World class dual-scan-engine. 100% portable – perfect for USB sticks. HiJackFree and BlitzBlank included.
Emsisoft BlitzBlank
BlitzBlank is a tool for experienced users and all those who must deal with Malware on a daily basis. Malware infections are not always easy to clean up. These days the software pests use clever techniques to protect themselves from being deleted. In more and more cases it is almost impossible to delete a Malware file while Windows is running. BlitzBlank deletes files, registry entries and drivers at boot time before Windows and all other programs are loaded.
Self made Emergency USB stick – Expand the content of the Emsisoft Emergency Kit to an USB stick and make your own universal tool to scan and clean infected PCs.

Microsoft Standalone System Sweeper (Beta) [FREE]
http://connect.microsoft.com/systemsweeper
NOW CALLED Windows Defender Offline
http://windows.microsoft.com/en-US/windows/what-is-windows-defender-offline
NEWS:
Microsoft ships free malware cleaner that boots from CD or USB
ZDNet (blog)
June 1, 2011, 10:15am PDT In a move aimed at cutting down on support call costs, Microsoft has released a malware recovery tool that boots from a CD or USB stick. Ryan Naraine is a journalist and social media enthusiast specializing …
http://www.zdnet.com/blog/security/microsoft-ships-free-malware-cleaner-that-boots-from-cd-or-usb/8712

Windows Defender Offline Beta
(Free from Microsoft, Scan with Windows Defender Offline Betafrom CD/DVD or USB Drive at Start Up to remove blocking malwares)
http://windows.microsoft.com/en-US/windows/what-is-windows-defender-offline

What is Windows Defender Offline Beta?
http://windows.microsoft.com/en-US/windows/what-is-windows-defender-offline
Windows Defender Offline Beta: frequently asked questions
http://windows.microsoft.com/en-US/windows/windows-defender-offline-faq
How to Create a Bootable Offline Version of Windows Defender
http://www.howtogeek.com/100289/how-to-create-a-bootable-offline-version-of-windows-defender/?utm_source=newsletter&utm_medium=email&utm_campaign=221211

We should point out that you can also scan your PC with a
BitDefender boot disk
http://www.howtogeek.com/howto/36677/how-to-use-the-bitdefender-rescue-cd-to-clean-your-infected-pc/
Kapersky boot disk
http://www.howtogeek.com/howto/36403/how-to-use-the-kaspersky-rescue-disk-to-clean-your-infected-pc/
Avira boot disk
http://www.howtogeek.com/howto/38889/how-to-use-the-avira-rescue-cd-to-clean-your-infected-pc/
or even an Ubuntu Live CD,
http://www.howtogeek.com/howto/14434/scan-a-windows-pc-for-viruses-from-a-ubuntu-live-cd/
this is one more tool to add into your toolkit.

ClamWin Portable (Antivirus, more) [FREE]
http://portableapps.com/apps/utilities/clamwin_portable
Antivirus to go…. ClamWin Portable is the popular ClamWin antivirus packaged as a portable app, so you can take your antivirus with you to scan files on the go. You can place it on your USB flash drive, iPod, portable hard drive or a CD and use it on any computer, without leaving any personal information behind.
NEWS: ClamWin Portable 0.97.1 (anti-virus) Released | PortableApps.com …
ClamWin Portable 0.97.1 (anti-virus) Released. Submitted by John T. Haller on June 17, 2011 – 7:46pm. logo ClamWin Portable 0.97.1 has been released. …
http://portableapps.com/news/2011-06-17_-_clamwin_portable_0.97.1_released

SUPERAntiSpyware Portable Scanner (Antispyware) [FREE]
http://www.superantispyware.com/portablescanner.html
Follow the instructions below to download the SUPERAntiSpyware Portable Scanner. The scanner features our complete scanning and removal engine and will detect AND remove over 1,000,000 spyware/malware infections. The scanner does NOT install anything on your Start Menu or Program Files and does NOT need to be uninstalled. The scanner contains the latest definitions so you DO NOT need Internet Access on the infected system to scan.

Comodo Cleaning Essentials
Comodo Cleaning Essentials is a set of portable antivirus tools
that will help you to detect and remove malware from an infected PC.
http://www.comodo.com/business-security/network-protection/cleaning_essentials.php
(DESKTOP http://www.comodo.com/ )

ESET SysInspector is a powerful, portable security tool that will inspect your system’s files, running processes, Registry keys and more, looking for and highlighting anything that could be a sign of malware.
(Makers of famous Eset NOD32 Antivirus – most awarded in history)
http://www.downloadcrew.com/article/20672-eset_sysinspector_12026_32-bit
(DESKTOP http://www.eset.com/us/ )

Norman Malware Cleaner is an interesting portable antivirus tool which will scan your PC, detecting and removing any malware that it uncovers.
http://www.downloadcrew.com/article/23283-norman_malware_cleaner
(DESKTOP http://www.norman.com/en-us )

The AVG Rescue CD is a portable environment that comes with a range of tools to help you clean up a virus-infected PC, fix hard drive problems, and get an unbootable system working again. This variant of the rescue CD is intended for installation on a USB flash drive. After downloading, you should extract the archive contents directly to the root folder of the USB drive you’d like to use. (If you don’t have a tool that can read RAR files, then try 7-ZIP).
http://www.downloadcrew.com/article/4650-avg_rescue_cd_usb_flash_drive_edition
(DESKTOP http://www.avg.com/us-en/homepage

CCleaner Portable
CCleaner Portable is a compact version of CCleaner that you can store on a CD, USB flash drive, microSD, or even two floppy disks if you still use those.
http://www.softpedia.com/get/PORTABLE-SOFTWARE/Security/Secure-cleaning/Windows-Portable-Applications-CCleaner-Portable.shtml
(DESKTOP http://www.piriform.com/ccleaner )

Emsisoft Emergency USB Stick (Antivirus + Antispyware) [BUY]
http://www.emsisoft.com/en/software/stick/ (USB Drive / Installed)
Emsisoft Anti-Malware Personal Edition. Malware, adware and spyware removal and scanning. Plug in an run – It is that easy to clean an infected computer with the Emsisoft Emergency USB Stick!
How it works: The Emsisoft Emergency USB Stick contains two useful programs which can be used to scan and clean an infected computer
quickly without a required software installation

How to Make a Bootable Antivirus Cd
How to Make a Bootable Antivirus Disc This document will teach you how to make a bootable anti-malware ( bootable antivirus ) cd/dvd step-by-step. … This is the best free way to remove any piece of malware with a 100% success rate. Steps: … Get Free Ultimate Boot CD
http://windows7themesxp.com/2011/09/how-to-make-a-bootable-antivirus-cd.html

HAPPY AND SAFE COMPUTING FROM THE WEBMASTER !
ONLINE HELP 24/7 BlueCollarPC Security Helper Website:
HOME: https://sites.google.com/site/pcsecurityhelper/PCSecurityHelper
HELP CENTER: https://sites.google.com/site/pcsecurityhelper/malware-removal-center
THREATS FAQS: https://sites.google.com/site/pcsecurityhelper/contact
BLOG: https://bluecollarpcwebs.wordpress.com


SENDER: gerald309 —
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005
MOBILES: http://pdamobilecafe.wordpress.com/
Alerts: pdamobilecafemobilealertlist-subscribe@yahoogroups.com
RSS: https://groups.google.com/forum/feed/pdamobilecafe-mobilealerts/msgs/rss.xml?num=15

25th anniversary of the firewall for computers

The 25th anniversary of the firewall: Celebrating a new generation
Posted on Jul 24, 2014 10:40 am
This month marks the 25th anniversary of the firewall and, like a parent looking back on the life of his children, I wonder where the time went. The McAfee Infographic that depicts the ‘lifetime’ of t…
Read in browser »
http://www.net-security.org/article.php?id=2079

MORE INFO: https://sites.google.com/site/pcsecurityhelper/windows-registry-help/pc-help
Firewalls / Information Links:

Comodo Personal Firewall [new, advanced users]
(Genuine Freeware, and rated by international tests as about world’s best – now includes antivirus real time)
http://www.personalfirewall.comodo.com/

Sygate Personal Firewall Free 5.6.2808 [Not supported, extinct]
(Old favorite now owned by Symantec)
http://www.softpedia.com/get/Security/Firewall/Sygate-Personal-Firewall-Free.shtml

ZoneAlarm Free Firewall
Protect your PC with #1 Free Firewall
http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm

Ashampoo FireWall Free 1.2 (popular) [wrkx w/ Netbooks]
http://www.download.com/Ashampoo-FireWall-Free/3000-10435_4-10575187.html

Online Armor Personal Firewall Free [new/advanced users]
http://www.tallemu.com/
Online Armor Free provides both a firewall and a whitelist approach to program security for Windows NT, 2000 and XP. It does not show pop-ups for many
known good programs, and it scans all your installed programs when it first runs so that you can quickly tell it what to do with apps it doesn’t know about.
Operating Systems:  Windows XP, Windows 2000, Windows Vista
What is firewall? – A Word Definition From the Webopedia Computer …
http://www.webopedia.com/TERM/f/firewall.html
This page describes the term firewall and lists other pages on the Web where you can find additional information.

Internet Firewalls: Frequently Asked Questions
http://www.interhack.net/pubs/fwfaq/
3.1 What are some of the basic design decisions in a firewall? … Can’tI just poke a hole in the firewall and tunnel that port? …

Windows Firewall in Windows XP Service Pack 2
http://www.microsoft.com/windowsxp/%20using/security/internet/sp2_wfintro.mspx
Learn the basics about the new Windows Firewall in Windows XP Service Pack 2, plus find out hot to adjust your firewall settings if you need to.

Firewall Builder
http://www.fwbuilder.org/
Firewall Builder is multi-platform object oriented firewall configuration and management tool. It consists of a GUI and set of policy compilers for iptables …

Firewall Net.com
http://www.firewall-net.com/en/
Guide to install & configure for Windows Mac or …Firewall Net is a guide for installation and configuration of firewall with windows 95 98 NT 2000 Me Millenium
XP, linux or mac , using : conseal atguard …

Firewall Q&A (Questions & Answers)
http://www.vicomsoft.com/knowledge/reference/firewalls1.html
A whitepaper on relevant firewall questions and answers. The knowledge of this subject relates to firewalls in general use, and stems from NAT and proxy …

Home PC Firewall Guide
http://www.firewallguide.com/
Learn how to protect home computers and networks from Internet outlaws by using personal firewall, antivirus and anti-spyware software plus low-cost …

Howstuffworks “How Firewalls Work”
http://www.howstuffworks.com/firewall.htm
An introductory explanation of how a firewall works and the various filtering methods used, with related links.

IPCop Firewall
http://www.ipcop.org/
A secure Linux distribution managed through a web-interface. It turns an old PC into a firewall and VPN gateway. Features an Intrusion Detection System.

OpenOffice (comparable to Microsoft products)
http://www.openoffice.org/
OpenOffice.org is the leading open-source office software suite  for word processing, spreadsheets, presentations, graphics, databases and more. It is available
in many languages  and works on all common computers. It stores all your data in an international open standard format and can also read and write files from
other common office software packages. It can be downloaded and used completely free of charge for any purpose.

 

-- 
SENDER: gerald309 -- 
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005 

Botnets: Everything Afraid To Ask Answered

Botnets: Everything Afraid To Ask Answered ….

This is a really good article covering about all the bases:

HTG Explains: What is a Botnet?
Botnets are networks made up of remote-controlled computers, or “bots.” These computers have been infected with malware that allows them to be remotely controlled. Some botnets consist of hundreds of thousands — or even millions — of computers. ….
http://www.howtogeek.com/183812/htg-explains-what-is-a-botnet/

Windows 8 and 8.1 gives malicious code the boot

Windows 8 and 8.1 gives malicious code the boot….

The following article needs some updating about today’s quality antimalware that has the new protections working with Windows 8 and 8.1….

Windows 8.1 gives malicious code the boot(s) TechRepublic The Windows operating system has a number of security controls, and most users have some sort of anti-malware security suite installed on their …
http://www.techrepublic.com/article/windows-81-gives-malicious-code-the-boots/

FOLLOW UP:

Threats/infection that launch before system:

Rootkit (definition) http://en.wikipedia.org/wiki/Rootkit

BOOTKITS Bootkits http://en.wikipedia.org/wiki/Bootkit#bootkit
A kernel-mode rootkit variant called a bootkit can infect startup code like the Master Boot Record (MBR), Volume Boot Record (VBR) or boot sector, and in this way, can be used to attack full disk encryption systems. An example is the “Evil Maid Attack”, in which an attacker installs a bootkit on an unattended computer, replacing the legitimate boot loader with one under his control.  Typically the malware loader persists through the transition to protected mode when the kernel has loaded, and is thus able to subvert the kernel. For example, the “Stoned Bootkit” subverts the system by using a compromised boot loader to intercept encryption keys and passwords. More recently, the Alureon rootkit has successfully subverted the requirement for 64-bit kernel-mode driver signing in Windows 7 by modifying the master boot record.

Today’s quality Antimalware products:

Early Launch Anti-Malware http://www.techopedia.com/definition/29079/early-launch-anti-malware-elam-windows-8?utm_source=tod_newsletter&utm_medium=email&utm_content=tod_more&utm_campaign=newsletter
What does it mean? Early Launch Anti-Malware (ELAM) is a Windows 8 security technology that evaluates non-Microsoft Windows boot time device/application drivers for malicious code. It is the first system kernel driver that starts in Windows 8 operating mode, before any third party software or driver. Techopedia Explains As a component of Secure Boot – also introduced in Windows 8 – ELAM is a detection driver used to identify malware, root kits or other malicious code/drivers initiated at system Read more »

(((Note …. newer technology for Windows 8 in antimalware (antivirus plus antispyware). Some additional links….)))

Windows 8 Early Launch Anti-Malware from Third-Party AV Vendors http://news.softpedia.com/news/Windows-8-Early-Launch-Anti-Malware-from-Third-Party-AV-Vendors-226789.shtml

Managing early launch anti-malware (ELAM) detections http://www.symantec.com/business/support/index?page=content&id=HOWTO81107

Windows 8 ELAM: too late, too little! http://www.virusbtn.com/conference/vb2012/abstracts/KulkarniJagdale.xml

How to configure Early Launch Anti-Malware Protection in Windows 8 http://www.bleepingcomputer.com/tutorials/configure-early-launch-antimalware-protection/

How to disable Early Launch Anti-Malware Protection http://www.bleepingcomputer.com/tutorials/disable-early-launch-antimalware-protection/

Understanding Early Launch Anti-Malware (ELAM) technology in Windows 8 http://www.thewindowsclub.com/earlylaunch-antimalware-elam-technology-windows-8

[Hot Fix] B0006 – The Early Launch Anti-Malware of Titanium 2013 does not load properly http://esupport.trendmicro.com/solution/en-US/1095123.aspx

Windows 8: Trusted Boot: Secure Boot – Measured Boot http://blogs.msdn.com/b/olivnie/archive/2013/01/09/windows-8-trusted-boot-secure-boot-measured-boot.aspx

-- 
SENDER: gerald309 -- 
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005

Q: Computer trouble please help – MyPC backup

Fw: Yahoo! Answers: Your answer has been chosen as the best answer

http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/message/3260

Q: COMPUTER TROUBLE PLEASE HELP?
http://answers.yahoo.com/question/index?qid=20130722185843AA2oMp9
ok so ever since this MyPC backup thing has been on my computer my computer has been messing up lately iv been getting ads on every website that i have been on and this hasnt happened before it all started when the pc thing came and its been making me really angry and i downloaded adobe flash player so i could watch videos and it says i downloaded it and then it says you need adobe flash player to watch this video and i downloaded the latest one and then ads just come up everywhere like now on yahoo there are alot of ads just popping up all over my computer and on youtube and on every website please help me i dont know what to
do
http://answers.yahoo.com/question/index?qid=20130722185843AA2oMp9

MY ANSWER AS ANTIBOTNET YAHOO ID

Best Answer – Chosen by Asker
You will probably be shocked to find it that it is malware itself…
MyPC Backup.exe Description
http://www.enigmasoftware.com/mypcbackupexe-removal/
MyPC Backup.exe is a dangerous executable file, which is related to malware, specifically adware programs. MyPC Backup.exe can cause data loss on an affected computer system or even damage the whole PC. MyPC Backup.exe is installed on the infected computer  without the PC user’s permission and knowledge. MyPC Backup.exe makes the targeted computer vulnerable to other security threats. MyPC Backup.exe can steal valuable confidential information and information about the browsing history of the victim. MyPC Backup.exe may change search results in any legitimate search engine with web addresses of sponsored websites and and divert victims to these doubtful websites. MyPC Backup.exe may also replace the homepage and default search egnine with the suspicious URL. MyPC Backup.exe repeatedly displays numerous bogus alerts/ warning messages on the screen of the corrupted PC about a variety of security threats and even advertise rogue security programs in order to remove supposed malware infections.
Type: Malware

Because you were able to install and run this it means you do not have quality antimalware (antivirus plus antispyware) installed on the computer or it would have immediately quarantined it to keep it from running and spying on you and running adware.

TYPE INTO SEARCH ENGINE…. “MyPC backup adware malware” and you will see valid reports fom known legitimate security sites reporting it as malwar as well as other sites such as security forums etc were other users have same problems.

RECOMMENDED you immediately install quality antimalware program and perform a full scan of the computer and remove all threats found in results. Becasue “MyPC backup” is rated as a high risk malware it may even block you from installing antimalware. The way around that is to either set the computer into Safe Mode With Networking and try installing and then perform scans. In Safe Mode only the few neccessary Windows processes load and nothing else which as well stops malware from running and allows for it to be removed. There is also the portable antimalware you can install on a USB Drive (not USB media stick – DRIVE – that is same price). You then run the antimalware from that to remove malware. SAFE MODE …. TURN OFF PC OR HIT RESTART. AS IT IS STARTING UP – KEEP TAPPING THE F-8 KEY TOP OF KEYBOARD. The PC will produce the black screen with options and choose Safe Mode. Do what you need to do – install scan, remove – and simply Restart the PC and will automatically start up in Normal Mode as regular use.

Check Threats and what they are here… http://bluecollarpc.us/threats-faqs/
Check all kinds of good well known and trusted antimalware products here …
http://bluecollarpc.us/help-center/
There are the many Genuine Freeware home versions of antivirus and antispyware but they do not have Real Time Protection (Sometimes called HIPS) activated like the full pay program which is about 40-50 USD (US Dollars) yearly. However there are just a couple free ones with Real Time Protection activated like pay products if money is issue. Real Time Protection (heuristics) blocks all malware from installing on the computer in the first place 24/7 – always running.
Malware is the term for all threats as virus, worm, trojan, adware, spyware, rootkit etc. Antivirus blocks/deletes viruses, worms, rootkits and most trojans. Antispyware blocks/deletes adware, spyware, keyloggers, dialers, etc and many other trojans antivirus misses. Spyware itself can have in its payload (malware package installed) – keyloggers which record all keystrokes on the keyboard. It can perform snapshots of your computer screen – what you are looking at. It can copy make copies of your files (photos, media, documents, etc) and altogether all things it is recording is broadcasted out to cyber criminals owning it which in turn generally go right to trying to perform an IDTheft from gathered stolen data from the PC including even financial stuff like logging into pay bills or buy stuff with cards etc any like passwords and pin numbers stored on the computer or recorded by keyloggers when signing in.

TRY ….
30 day fully working free Eset Antimalware (about best in world)
Free 30-day Trial of ESET NOD32 Antivirus 6
http://www.eset.com/us/download/home/detail/family/2/?trl=ea
After 30 days it will stop working. You can buy it or then uninstall it after 30 days.

ALSO Emergency tries if things are blocked….
MalAware 1.0 http://www.emsisoft.com/en/software/malaware/
Emsisoft Emergency Kit 2.0
http://www.emsisoft.com/en/software/eek/

FULL PROTECTION FREE ONES:
http://antivirus.comodo.com/
http://www.microsoft.com/security_essentials/

Source(s):
http://www.enigmasoftware.com/mypcbackupexe-removal/
http://en.wikipedia.org/wiki/ESET_NOD32
http://www.betterantivirus.com/nod32-and-virus-news/archives/1456-December-2009-ESET-antivirus-scoops-59th-VB100-Award.html
http://www.microsoft.com/security_essentials/
http://antivirus.comodo.com/

— On Tue, 7/23/13, Yahoo! Answers <answers-alert@…> wrote:

> From: Yahoo! Answers <answers-alert@…>
> Subject: Yahoo! Answers: Your answer has been chosen as the best answer
> To: antibotnet@…
> Date: Tuesday, July 23, 2013, 12:54 PM
>
> Take me to
> Yahoo! Answers. I want to answer more questions!
> Hey,
> AntiBotnet, look what you got!
> Congratulations,
> you’ve got a best answer and 10 extra points!
> Your answer to the following question really hit the spot and has been chosen as the best answer:
> COMPUTER TROUBLE PLEASE HELP?
> Go ahead, do your
> victory dance. Celebrate a little. Brag a little.
> Then come back and answer a few more questions!
> Thanks for sharing what you know and
> making someone’s day.

trimmed!

Choose InPrivate Browsing, Incognito mode, disallows web browsing activity stored

Choose InPrivate Browsing, Incognito browser mode disallows web browsing activity stored. And we will discuss why this is extremely important in today’s in-secure world wide web concerning malware, hackers, account break-ins etc.
 
InPrivate Browsing – Microsoft Windows – Windows – Microsoft
Learn how Internet Explorer 9 helps keep your browsing activity private.
Keep your information to yourself with InPrivate Browsing
Sometimes you don’t want to leave a trace of your web browsing activity on your computer. Whether it’s shopping for a gift on a shared PC or checking an account at an Internet café, you don’t want to leave any evidence of your browsing or search history for others to see.
InPrivate Browsing helps prevent your browsing history, temporary Internet files, form data, cookies, and user names and passwords from being retained by the browser. You can start InPrivate Browsing from the Safety menu, by pressing Ctrl+Shift+P, or from the New Tab page. Internet Explorer will launch a new browser session that won’t keep any information about webpages you visit or searches you perform. Closing the browser window will end your InPrivate Browsing session.
 
Private Browsing (Choose Firefox Setting)- Browse the web without saving information
When using a shared computer, Private Browsing is great for viewing websites without saving stuff like cookies, temp files and a history of the pages you visit.
 
Incognito mode (browse in private) – Chrome Help
Incognito mode (browse in private). For times when you want to browse in stealth mode, Google Chrome offers the incognito browsing mode.
 
Privacy mode – Wikipedia, the free encyclopedia
Privacy mode or “private browsing”, sometimes informally referred to as “porn mode”, is a term that refers to privacy features in some web browsers. Historically speaking, web browsers store information such as browsing history, images, videos and text within cache. In contrast, privacy mode can be enabled so that the browser does not store this information for selected browsing sessions.
 
Netbooks: Reading about netbooks and found the Temporary Internet Files areas actually tear up usage on netbooks as far as even slightly diminishing life of product. So for netbooks it is ALWAYS best to use In Private Browsing / Incognito etc. Netbooks as meaning PCs with Solid State Drives as opposed to regular Desktops, Notebooks, and Laptops with conventional physical computer Disk Drives. Basically was saying (looking for link) this burns up memory components just a tad faster on SSD (solid state drives) I guess which includes desktop models as ThinkPad ?
 
You can view here our discussion http://tech.groups.yahoo.com/group/Windows_Vista/message/3949 which began with the question “Where do I find the Temporary Internet Files folder in Windows?”
 
One of the ways I found it back in the XP years was running a Disk Clean Up. When that finished and popped up the panel to choose what to clean up – it also had the click to View These Files, which was the Temporary Internet Files. That was way back in the XP years like 2001-2 when the very, very first adware and spyware threats were being discovered. You can see like all the little picture icons and images from pages visited, cookies files, other graphics images, and on and on. Point was that spyware could see these that easy too. They could now put together the plan for the ID/Card Theft route by seeing financial sites visited and so on. Original form of what today is called Social Engineering – whereby today unfortunately too many times, chatty-cathys/freds just blurp out all the information publically like at Facebook etc etc etc. OMG!
 
TRY: – open IE (Internet Explorer) and click Tools > Internet Options > General tab > Settings > View Files ….. there they are.
 
NOTE If you click View Objects – there would be what is called Downloaded Program Files which was an age old malware haunt whereby you might find a malicious used ActiveX item that would/could have correlating files and keys in WindowsSystem32 and the Registry. Generally from a trojan. If there were items there, these can be identified by right clicking Properties (will not cause execution of malware) and if they are not familiar items with descriptions such as like Java stuff and other valid programs like Yahoo Messenger, etc, ActiveX items – then they would generally have no identifiable information. I caught two of them in my lifetime, one which was uniquely discovered with a correlating System32 file(DLL library) but also with the Transparency display coding written in for display, and was “invisible” in a toolbar installed which was actually a malware toolbar. It was redirecting to sites not chosen etc etc etc. Culprit discovered. Invisible BHO type item (Browser Helper Object). In reality it “appeared” as an additional transparent (virtually invisible) radio button on the toolbar but was actually a control type object of a trojan package. SEE http://en.wikipedia.org/wiki/Radio_button
 
By habit I have learned to delete all these (Temporary Internet Files) actually each time the browser is closed (Internet Explorer) , and even check Don’t Store any of this on other browsers. This area is the Windows “magic” for speed whereby it stores mostly many of the graphics items from a website in the temporary internet files and when the site is visited again, while the page is loading, it puts up those images already downloaded rather then the time to download them again and made displaying the website faster. In effect the PC is used as a server in some degree. Of course this is as archaic as Dial Up days, but is still useful because there are still many areas dial up is all that is available – no broadband/dsl yet. So if not on dial up, I recommend to delete all these all the time everytime the browser closes. You can do that with Internet Explorer here…..
 
Open IE (Internet Explorer) > Click Tools > Internet Options > click Advanced tab > Scroll down towards bottom and check Empty Temporary Internet Files When Browser Is Closed > click Apply  to save changes and click Okay to close panel. Done.
 
TIP: Too many users get used to clicking the Stay Signed In to keep the cookies etc to just enter a sign in type website like Yahoo Groups here for instance. That is available just about everywhere you need to be signed in to participate even like financial sites (pay bills etc). In about the last 18 months, cyber criminals are now breaking into systems right through stored cookies in the system. They were breaking into Facebook accounts this way with botnets and other malware payloads. So nowadays it is simply recommended to NEVER store cookies on the computer anywhere, and of course where possible to never even store any type of Internet Temporary Files which includes Java temporary internet files (access settings by double clicking Java icon at Start > Control Panel > Java) .
You can do much of that by using InPrivate Browsing when opening IE and choose that as default with Firefox. Other browsers, similar settings. You just tweak all these little ditty security settings. The point is to attempt to protect all data loss in the event of a malware successfully infecting the system. Any and all of these and much more is comprimised within seconds. So it is safeguarding as much as possible to completely minmize information retreived by an infection. Even the best of the best antimalware products will tell you they are not perfect. Malware can get past the best in the world. Be Prepared.
 
TIP: …the other tip here as related is to, again, open IE and Internet Options. On the General tab on the panel it has the check box for “Delete Browser History On Exit“. You check this AND the one at Advanced tabs also. BUT – Microsoft ships the system since the beginning with the least amount of these default settings on. Stupid from them. They ship the system with like a 1,000 settings any user can use for what they wish to use their PC for. Way back users would complain – like going back to Windows 95 and even earlier. They wanted things totally untouched to set things up they way they wanted. But they did not have todays malware threats or even dreamed of them yet – so, stone age days.
 
Clicking “Delete Browser History On Exit” / Apply on the General tab – THEN click DELETE…. it will not do anything yet, but present check boxes for what you want to delete each time the browser closes or is used as a manual deletion time to time according to preference settings employed. HERE is that Microsoft default now where they go the other way AGAINST security and by default have all “Preserve Favorite Websites data” – which will NOT delete those saved cookies for “Keep signed in at this site” etc. You uncheck that as security minded security tweaks in settings across the board. It should be worth the extra second to manually sign in each time and if passwords remembered is problem perhaps a secure trusted Password Manager utility software will serve as “Keep Signed In To This Website”. The other side is if they hack in to the PC and websites are already logged into – well there you are. They can go right into to all accounts WITHOUT passwords!
 
TRY …. (for a simple click to do all this) …
 
CCleaner – CCleaner supports the cleaning of temporary and unneeded files from certain …
(very popular, safe, freeware/donate)
 
ADD FOR FIREFOX…. BetterPrivacy :: Add-ons for Firefox https://addons.mozilla.org/en-US/firefox/addon/6623
Customize Firefox, Thunderbird, and other Mozilla products with thousands of … Better Privacy serves to protect against not deletable longterm cookies ….deletes flash cookies that none others generally delete. Cookies should only be given session cookies permissions as a privacy and security issue (cookies have been broken into by malwares) and only if necessary.
 
 
%d bloggers like this: