Challenges extending protection afforded to computer programs?

Challenges extending protection afforded to computer programs?

By bluecollarpc – Last updated: Friday, April 19, 2013


Challenges extending protection afforded to computer programs?

An actual good question put forth I fielded…. (handle “antibotnet” is a secondary one I use at Yahoo)


Q. What are some challenges with extending the extent of the protection afforded to computer programs?


My Answer….

Malware has become quite sophisticated over the years because of antimalware programs becoming the more. Briefly, the point is that cyber crimewares and their malicious users (generally for illicit profit) oft times seek “softer targets” then the usual drive-by infection or malware laced email attachments etc.

Some of these have been softwares installed on the PC affording a break in to the system and even install many malwares and to even attempt to disable existing antimalware installed to take over the computer for nefarious reasons.

Those creating software have had to include adding security to them – to create safer programs by code hardening etc.

There is a security company that has offered free to the community (for several years now) a program that completely automates updating softwares installed on the computer. Many times newer established software programs have Update buttons in them to manually check for and apply important updates. These may also include a program Upgrade to a newer version which will be safer security wise, and may include cosmetics/features upgrades or additions.

The “challenges” you ask, to me, would be learning about the computer system and all the many Settings it contains which includes Recommended Security Settings. In short, if you want to really get serious and tweak the system and softwares installed – you may ultimately run into a 100 settings to observe and change to preferences – security minded preferences as recommended.

The challenges as to keeping all installed softwares up to date with patch/fix/update/upgrade has been automated by a very durable program from Secunia – millions of users now. The PSI scans softwares and their creators for any issued. You can choose to automatically or manually update any available. You can choose to run it at start up or manually once every two weeks or monthly etc. Those challenges would be to comb every website the softwares were downloaded from – the product company – to see if there are any messages/notices about Updates available as opposed to Upgrades. These are issued time to time and not always posted on their websites. It becomes all too tedious unless using only a couple wares. Most users end up trying everything under the sun to have fun or productivity on their PCs – what you can do with them. That results in a too painstaking search for keeping things up to date.


I TOTALLY RECOMMEND …. (to automate the challenges safely) …..

Secunia Personal Software Inspector (PSI) The Secunia PSI is a free security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks.

“Free computer security Stay secure by updating insecure programs on your computer with the Secunia PSI

The Secunia Personal Software Inspector (PSI) is a free computer security solution that identifies vulnerabilities in non-Microsoft (third-party) programs which can leave your PC open to attacks. Simply put, it scans software on your system and identifies programs in need of security updates to safeguard your PC against cybercriminals. It then supplies your computer with the necessary software security updates to keep it safe. The Secunia PSI even automates the updates for your insecure programs, making it a lot easier for you to maintain a secure PC. Using a scanner like Secunia PSI 3.0 is complementary to antivirus software, and as a free computer security program, is essential for every home computer.”

There is a total ongoing maintenance you learn by habit of manually “looking under the hood” – inspecting areas like Program Files, System32, Windows Registry, etc. Manually looking for malware entries. After first time spring cleaning of the PC and ongoing use of quality antimalware, this becomes a time to time task. It is good to know the PC like the back of your hand eventually.

Windows Updates of course are most times critical and important to install when issued. This should be set to automatic as recommended for the average user. You can check for missing Windows Updates with a click and quick scan using….

Microsoft Baseline Security Analyzer

There are many more “power tools” to make you a “power user” . here are a few more….

Belarc Advisor


jv16 PowerTools / PowerTools Lite

Microsoft Malware Prevention troubleshooter



You will find a good short list here  of the security technologies Microsoft has developed over the years and incorporated into the Windows Operating System.






Welcome all, archived blog installed

Welcome all, archived blog installed….. We have imported our archived blog posts from our original BlueCollarPC @ WordPress security blog. This is located at

We will keep the free version and continue to post to it, as has been linked for years. I am the original webmaster of the BlueCollarPC .Net and .Org and lastly .US . The BlueCollarPC .Net originally began about year 2005 as a help and information site dealing with spyware as main course. There were many video help tutorials for download in several formats. This became a huge site trafficking about 2,700 to 3,000 Visitors monthly, and tolled in at just over 6 million by 2009. Those kinds of numbers are usually seen at small business sites, but I had just a simple personal website !

Being able to help that many people who found our site as a primary or a main additional site for help and instruction in PC security and malware removal outweighed any personal pride or egotism in hits counters. That is what it was launched for, genuine informed help – not a personality contest. It was humbling to see those kinds of numbers though.

Push come to shove, our site was attacked and there were several behind the scenes personal attacks against myself and equipment – attempts at destroying computers and mobile computer. These attacks were sophisticated dreaded botnet payload attacks and another as attempting circumventing Vista technology and destruction. So, my site theme being “BlueCollarPC” as a spyware removal  site originally, now was upgraded to a full blown malware removal help and instruction site – all malware with heavy concentration into botnet detection and removal and restoration of damaged systems and I graduated through this all into Amateur Forensics (Computer Forensics). What did not kill us makes us stronger, and so it goes. All but the BlueCollarPC .US were closed with this new full malware removal site including information and help against all malware now as viruses, worms, trojans, rootkits, adware, spyware, botnets and bootkits. etc etc etc.

At the end of the decade (2000 to 2010) and into the new one, things seemed to be a ghost town at many help destinations as groups, forums, and lists, others. It seemed the whole “XP Generation” of  the “XP Years” (Windows XP) had graduated and learned it all or enough to carry them through. Of course I invested into a Vista PC which was the actual crown jewel of the decade in security software – unprecedented as an operating system itself being the best security software available. To this day Windows Users are unaware that viruses could not run on Vista and neither the dreaded rootkit malware. UAC User Account Control was just one of these new security technologies in Vista. First hand, no lie, two or three times I saw a virus execute to install on my Vista (drive by hit – bad website, tried to install scareware fake antivirus programs). Sure enough and word for word from Microsoft – “viruses are not able to write to the disk in Vista”. They the payloads were in Temporary Internet Files. All I had to do was close the browser with the settings I had clicked to “Delete All Temporary Internet Files” etc. I also use and ran CCleaner offering a little more clean up. That was it. The virus was gone ! I then scanned with high quality antimalware to prove it. Zero infection. The point  was, or joke, you did not even need antivirus with Vista – like “you’re kidding, you actually purchased antivirus for Vista ? What for ? ” Seeing is believing.

Windows 7 was the first time in history an operating system (Windows, Linux, Apple/Mac etc) was actually downgraded security wise. Users screamed about UAC. The security world kind of went with – what idiots, sorry to say. This did not make sense. It did not make sense worst, that Microsoft themselves accomadated them. LOL. You get what you pay for. They seemed to love no intrusion whatsoever on having a good time on the Net – utterly regardless of the dangers. It was like handing drunk teenagers the keys to the sports car. We all know how that ended. Many never made it home.

Enter Windows 8 with the new anti-rootkit / anti-bootkit technologies – the ‘secure boot’ Windows 8. Windows 8 is a gigantic leap forward from XP as blocking rootkits/bootkits from running before antimalware programs are able to boot to begin detecting malware attempting to run in the session. With XP, we all know if a rootkit was suspected it meant reinstalling Windows as the ONLY cure. The trouble was most anti-rootkit softwares were crap at detecting them and even worst at attempting to remove them. Enter Windows 8 new security technologies. THOSE DAYS are over with forever. Just before Windows 8 hit the streets there was hint at they could crack this. But as well there is new anti-malware softwares that can “cold boot” to detect this. Somewhat as being able to scan the system without even starting the computer and as it does start up. Bye bye, covered anyway.

Well back to re-launching BlueCollarPC.US – now in the WordPress format rather than the traditional website. Kind of all in one – blog and content, links. Spread the word – “We are back !” (StarTrekkies – Romulans and Enterprise Captain Picard in the Neutral Zone Confontation over Borg encroachments).

From our alternate back up website at

Welcome to the BlueCollarPC Security Helper!
SPECIAL NOTE: Our Main Domain BlueCollarPC.US is being closed June 2012.
For the record….. I began the BlueCollarPC Computing Security Community Website in 2005 at the original .Net website. I believe at that time, the .Com website was actually a PC Repair Shop which I was not connected with. Towards the end of 2009, the BlueCollarPC .Net created by me had enjoyed just over 6 Million Vistors/Users! – are proud to have been a part of it all and indeed actually had “discovery” in the security industry concerning the malware RASautodial registry entries discovered by Yours Truly. Never be afraid to ‘take a look under the hood’ of your PC ! You never know what you’ll find.

Internet Explorer continual long running script error – malware or fix available ?

Internet Explorer continual long running script error – malware or fix available ?

This has been edited from an actual help question/answer I made here: Re: [Windows_Vista] in Internet explorer 9 Mon Apr 1, 2013 1:20 pm

The symptoms were that the user was getting the ‘long running script error’ (or similar) error messages at multiple websites – not just one….

One common cause can be this…..

Stack buffer overflow From Wikipedia, the free encyclopedia

“In software, a stack buffer overflow (also known as stack smashing) occurs when a program writes to a memory address on the program’s call stack outside of the intended data structure; usually a fixed length buffer.[1][2] Stack buffer overflow bugs are caused when a program writes more data to a buffer located on the stack than there was actually allocated for that buffer. This almost always results in corruption of adjacent data on the stack, and in cases where the overflow was triggered by mistake, will often cause the program to crash or operate incorrectly. This type of overflow is part of the more general class of programming bugs known as buffer overflows.[1]…..” FULL

That is somewhat to the opposite what a crafted malware can do – flooding, injecting lengthy nonsense to the point it starts overwriting in the memory and overtakes or destroys, whatever the malicious intent.

INFO LINKS Error message: “A script on this page is causing Internet Explorer to … Some tests and benchmarks may use scripts that take a long time to run and may want to increase the amount of time before the message box appears.

How to troubleshoot script errors in Internet Explorer Describes how to troubleshoot the following script error: “Problems with this Web … FIX: You may receive a script error when you try to run a script on a computer …

There are many types of scripts for various content on a website. There is also like Java script. Check out this simple short information…. How is JavaScript different from Java?

Since you are saying the symptoms are “dang near every page” – it seems this certainly is not just some bug at any website that has some new content they uploaded but was flawed in language causing a bug or two and they were not aware of it yet to fix it. So, to me, it seems it leans toward the internet connected browser – Internet Explorer.

Many times you get that message and there also would be a pop up to click to “Stop the script” and end of story, you go on with what you were doing. Apparently this is not happening.

QUICK FIX….. For a quick fix you can use the “magic” in Internet Explorer many users are unaware of. Lots of Firefox users say they like it more because it does not allow Active X to run and you an install plug ins to stop scripts from running at every website and give temporary permission etc etc etc. Seems to run faster. (You can click not to allow Active X to run in IE too) THAT is very messy and not necessary in Internet Explorer. You simply shove the Security setting all the way to HIGH…..

So that you do not encounter the error first change your Homepage in IE (Internet Explorer nic) to a known good site (you can change back later anytime). A good fast loader is (white page, not full of graphics etc). GO TO…. Start > Control Panel > click Classic View ( upper left) > Internet Options > panel opens and change the Homepage to ….. click > Apply

NEXT click the Security Tab in the same panel, Internet Options. It is probably at Default settings – ‘Medium High’. If it says “Custom” then first click Default and Apply. NOW slide that Settings bar all the way up to “High” and click Apply / OK  / close the Internet Options panel.

Okay, open Internet Explorer and you are now going to experience Internet Explorer running even safer and faster than the similar Firefox set up without having to click nothing for each individual site. HIGH Security settings in Internet Explorer stops all kinds of website add ons and scripts and java and auto runs and embedded players and on and on and on. It stops all the crap kind of like Plain Text email does. This setting should stop whatever was running and try going to a few familiar sites to see how it performs. (Don’t forget after all said and done to click Default again in Internet Options IE for normal browsing).

NEXT if IE is browsing okay I would absolutely want to run a good scan with a quality antimalware program. I am assuming you probably have one installed as a veteran Windows user. There is possibly a malware that is failing in attempt to rifle the Internet Explorer browser – hijack it – but is a flawed malware and can not execute properly for its nefarious intents.

A common attack at rigged websites is…..

Cross-site scripting Wikipedia, the free encyclopedia Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications. XSS enables attackers to inject client-side script into …

….BUT again you are saying it is not an individual website but is occurring everywhere. So if there is no malware present – ruled out by full scan by quality amtimalware as Symantec, Trend Micro, Emsisoft, Bit Defender, NOD32 etc etc – I would move to a more advanced solution.



Most users are oblivious to Java exploits and zero days in security news. This is a REAL worldwide event and many entities are completely disabling Java. As recommended and as I do ( I am in pc security since 2005 anyway) – I uninstalled Java from my computers and have disabled ALL Java plug ins in ALL browsers.

READ UP  / Seeing is believing…. (my security blog)   Catch Up With Java Malware Information March 3, 2013 — bluecollarpc

You can now see the horrific extent and nightmarish ongoing continual cyber crime attacks to circumvent Java and security to take over computers worldwide. I don’t remember ANY such event in this magnitude since I have been online from 1999. For users unaware, the only possible defense was quality Real Time Protection antimalware. Additionally, this does not apply in your case – the recent Internet Explorer Zero Day….

US-CERT – Microsoft Releases Security Advisory for Internet Explorer Microsoft has released Security Advisory 2794220 to address a vulnerability in Microsoft Internet Explorer 6, 7, and 8.

RECAP…. (my advice) ….

# Regain control of navigation of the system by placing Internet Explorer in ultimate High Security Settings. Note, Internet Explorer is not a separate software but is part of the Windows OS (operating system) – Unix Certified.

# Perform a complete full scan of the system and files with a quality antimalware product and have installed same with Real Time Protection activated. Quarantine any malware found, should be automatic. Try installing ….. / run it…. (clean scan will also rule out botnet activity) BitDefender Launches Free 60-Second Virus Scanner

# Restart the computer and perform a quick scan by quality antimalware program without internet connection.

# Uninstall Java from the computer at Control Panel > Programs/Features. (Optional, I would). As well, disable Java in ALL browsers in their Tools/Settings.

# Clean ? Connect to the internet and run Windows Updates and apply ALL security and Important Updates.

# Upgrade ALL browsers to their latest versions. Firefox > Click About Firefox… will scan instantly to see if latest version is installed. Same/similar in Google Chrome browser, others. (Little known fact, Opera and Firefox along with a handful of other softwares received the ultimate disgrace as being rated “Riskware” in 2009 or 2010 by respected institutes worldwide ! )

# If still experiencing trouble, I would reconsider an informed choice as to “quality” antimalware. Many users believe hype and paid advertising good reviews by like magazine type destinations rather than the real world truth from independent labs and word of mouth from experienced advanced users. For instance, you may have heard raves over free MalwareBytes. This product has not even achieved the simplest certifications yet…..

VB100 Award = Perfect scores ! (Top AntiVirus World Prize)

West Coast Labs

Malware Research Group

Welcome to the independent and renowned ProtectStar Test Lab

Welcome to


HiJackFree (Genuine Freeware) [wrkx w/ Netbooks] Freeware! HiJackFree helps advanced users to detect and remove Malware manually. With HiJackFree you can manage all active processes, services, drivers, autoruns, open ports, hosts file entries and many more. For your full control over your system.

Alternatively you may want to install…. HiJackThis Description. HijackThis is a free utility that generates an in depth report of registry and file settings from your computer. HijackThis – Wikipedia, the free encyclopedia HijackThis (also HiJackThis or HJT) is an open source enumerating tool for Microsoft Windows originally created by Merijn Bellekom, and later sold to Trend Micro. ….. and post the HiJackThis Log for analysis. IN THESE DIAGNOSTICS DO NOT CLICK “FIX” ANYWHERE ! Generally for advanced use or may render software or even Windows itself inoperable with a wrong removal or fix !

# Last resort, if this continues as mentioned, I would have to consider reinstalling Windows and bring ALL things up to speed security-wise as mentioned…. Run Windows Updates apply all, upgrade all browsers, uninstall Java and disable Java plug ins in all browsers, install quality antimalware with Real Time Protection enabled.

— Gerald309-> (for reference) HOME: (webmaster, down for the moment)

Additional Follow Up (these are just my opinions, suggestions I am no expert LOL)

In the one Microsoft Information/Help link, Microsoft suggests diminshing the time out time so that in these events it would not seem to be an endless looping hung application or frozen scenario or crashing abrubtly intermittingly.

To do this, they give the Windows Registry keys to edit or insert – writing into the Windows Registry. …..jv16 PowerTools and is about best in world for well over 10 years. The free version (registry clean up) does not have the registry write in / modification features. You can do this manually but the paid version just makes it easier to do. Apparently, Microsoft is instructing to cut short the time-out to avoid the hung application scenario (meaning the browser in this case) or frozen browser. Apparently the fix will cut short the script etc running and then with in seconds or whatever the browser is normal again without these running. The FIX there is for versions 8 down though.

In other words look at…. “Let me fix it myself”

This would be a high tech solution as the average user has never even opened the Windows Registry or even know that user access exists. Of course this is where all the warnings come in to “NEVER touch anything in the Windows Registry unless you know what you are doing or you may damage Windows and/or other softwares. ”

I am not suggesting you alter your registry. I am offering the information to read between the lines as to what the problem actually is. Then to go from there in any possible solution as easy as possible.


Internet Timeout Virus


“Timeout Virus Sends Different Messages Web Scanners Bundled with certain Anti-Virus Packages can cause Time out

The Internet Time Out Virus sends out varying messages. Some include:”A Run time error has occurred. Do you want to debug? Line 34 Error: Permission denied” or “Runtime Error! Program:E\Program Files\Internet Explorer\iexplore.exe. This application has requested the Runtime to terminate it in an unusual way”. Microsoft Support offers a fix for this you can download. Some Causes Viruses are a fact of life online.

A family of programs called Vundo Trojan can cause some Web browsers to have problems loading certain high traffic sites such as search engines and social media. It spreads through network drives and uses different methods to reside on your computer. It is not easy to detect. Firewalls Selectively block Internet Access Run a full system spyware scan daily.

Sometime the problem occurs because a timeout limit to return data has been imposed on the server by your Web browser. The default timeout limit could be five minutes to 60 minutes. In case of server problems, the browser will keep waiting. A solution is to reset or change the default time out setting. Incorrect firewall settings may also give a timeout message.”


I added this to maybe help identify what I suggested as problems and how to fix easily.

The bottom line here would be that reinstalling Windows is such the overkill and unnecessary if a simple registry edit was the cure. I am going to look for this for IE version 9 to see if they posted a fix.

Addditionally if you want to skim over some Windows Registry information help to get a little familiar to what is being said you can look at a help page I have \up here form my web (Google Sites)

I would just review things mentioned in the several help answers and wait a little for maybe more and keep posting, hang in there to get it fixed.

gerald philly pa usa Home

PS….TIP: If you move towards editing the registry, a paid software with registry Back Up features is not necessary. Simply open the Windows Registry and click Export and then Save to like My Documents with any File name you want to give it like “Registry Back Up Jan 2013” example.

Click Start > Run > type in “regedit” without the parenthesis > click OK > … the Windows Registry Opens…. > click File > Export

Note that this takes about 10 to 20 seconds to complete before ready to save it as a file. NOW if there has be any mistake made then you simply close everything running (browsers, email, software program, etc etc) and Go To the back up file you saved in like My Documents. YOU SIMPLY DOUBLE CLICK THE BACK UP FILE AND WINDOWS REGISTRY REINSTALLS TO THAT SAVED FILE WHEN IT WAS WORKING. It will over write the entire registry and write in the registry as it was saved. Of course you do not do other things as install new softwares, Windows Updates, etc in between time while working on the registry. You do your fix task and confirm it is okay by navigating the pc a bit and maybe open afew softwares one at at time and close them. things working ? try a reboot and try again to confirm the registry edit is okay and everything is working.

The reinstallation of the Windows Registry is like System Restore. The System Restore Point is a snaphot of the entire system at that instant. Same thing in the Windows Registry back up file. It can only rewrite that “snapshot’ in time of what was in it. If you were to make changes (as installations and updates/upgrades) before checking the edit was okay – then these new registry keys from the changes would NOT be in the back up and would not then work no doubt until uninstalled and reinstalled if possible. A manual uninstall may be necessary of these as would be “corrupted” due to missing registry keys and entries.


As Microsoft mentioned to clean up Temporary Internet Files, the easiest wy to do this is with a very popular safe durable software called CCleaner (nic crap cleaner) used by millions and millions of Windows users. It is Genuine Freeware meaning NO ads, ad pop ups, etc etc.


Here is the normal settings used in it for entire safe clean up of junk temporary internte files etc….

Recommended Settings and use of CCleaner – Temporary Internet Files Clean Up Browsers, Applications January 14, 2012 — bluecollarpc

NOTE it is recommended NOT to keep any cookies stored on the PC as malware now can break into a PC and take it over through stored cookies. This was happening at Facebook users. SEE:

Delete ALL cookies ALL the time EVERY time Facebook malware reminds us December 27, 2011 — bluecollarpc

TIP: You rarely hear about cleaning up Java temporary files. Malware tries to reside and hide here from detection and removal. You can achieve this by opening the Java Panel…..

Start > Control Panel > Java …. double click the Java panel icon to open it.

In settings there, go to the Temporary Files and click delete all. This affects nothing and is safe to perform anytime. There can be age old files there and a mini malware payload. It is better to even choose “Do Not Store Java Temporary Files On This Computer”. This blocks Java based malware from executing a payload from these files. This is a safe setting or they would not offer it. May slow navigation a nanon second if that. I did this 5 years ago or more before actually uninstalling Java due to current ongoing crisis with it.

gerald philly pa usa

Catch Up With Java Malware Information

Catch Up With Java Malware Information….. Day after day seemingly, week after week, for about 100 days or more it seems cyber crime has declared war on Java a handful of ‘zero days’ as well have been suffered. For security reasons it has been actually advised to disable Java in ALL browsers and even uninstall Java from the computer. This has been no joke if you have not been keeping up with all the security warnings and actual INFECTIONS occurring via exploiting Java ! READ ON TO CATCH UP IF YOU MUST ! ! ! FOLLOW THE TIMELINE TO DATE….


 Aug 29, 2012

US-CERT Alert – Oracle Java 7 Security Manager Bypass Vulnerability
Fw: US-CERT Alert TA12-240A – Oracle Java 7 Security Manager Bypass Vulnerability…System US-CERT Alert TA12-240A Oracle Java 7 Security Manager Bypass Vulnerability…Yet * Let’s start the week with a new Java 0-day in Meta…..

Critical Java 0-day flaw exploited in the wild
Critical Java 0-day flaw exploited in the wild Posted on Aug 27, 2012 06:11 pm Researchers…security firm FireEye have discovered targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims…

Aug 30, 2012

Unpatched Java exploit spreads like wildfire
Unpatched Java exploit spreads like wildfire Naked Security Sophos customers are proactively protected against the malware payload as Troj/Agent-XNE and the malicious Java applet as Mal/JavaKnE-H. Sophos endpoint customers using our web protection…

Java 7 Under Attack: Researchers Advise It Be Disabled During The Interim
Java 7 Under Attack: Researchers Advise It Be Disabled During The Interim CRN…thereof. “IT administrators’ only defense at the moment is to limit the use to Java,” wrote Wolfgang …

Disable Java NOW, users told, as 0-day exploit hits

Disable Java NOW, users told, as 0-day
exploit hits web Register The vulnerability allows…keylogger or some other
type of malware . The payload does not need to be a Java app itself. In
the form in which it …

Java 0-day exploit added to Blackhole kit, still no news
about patch

Java 0-day exploit added to Blackhole kit,
still no news about patch Posted on Aug 29, 2012 12:20 pm The recently
discovered Java zero-day flaw that has been spotted being used in limited
targeted attacks in…

Aug 31, 2012

Zero-day Java flaw exploited in targeted tax email malware attack
Zero-day Java flaw exploited in targeted tax email malware attack by Paul Baccas on August…cybercriminals have taken advantage of the critical zero-day flaw vulnerability in Java, sending out malicious emails which pretend to come from an accountancy firm…

Java Zero-Day Malware Attack: 6

Java Zero-Day Malware Attack: 6 Facts
InformationWeek Businesses are growing worried about drive-by infections by
malware that exploits two zero-day Java vulnerabilities. Attackers,
apparently operating from China, chained the two…

Java is Insecure and Awful, It’s Time to Disable It, and
Here’s How

Java is Insecure and Awful, It’s Time to
Disable It, and Here’s How As usual, there’s yet another security hole in the
Java Runtime Environment, and if you don’t disable your Java
plugin, you’re at risk for being infected with malware. Here…

Sep 1, 2012

Java 0-day exploit served from over 100 sites
Java 0-day exploit served from over 100 sites Posted on Aug 30, 2012 03:23 pm The problem of the two unpatched Java zero-day vulnerabilities that are actively exploited in the wild by attackers…

US-CERT Releases Oracle Java JRE 1.7 Security Advisory
Fw: US-CERT Current Activity – US-CERT Releases Oracle Java JRE 1.7 Security Advisory —–Original Message—– From…Awareness System US-CERT Current Activity US-CERT Releases Oracle Java JRE 1.7 Security Advisory Original release date: Tuesday…

Oracle releases patches for Java vulnerability CVE-2012-4681
hours ago – Oracle has released a new patch which kills off a
in Java 7 that was being exploited by malware developers. “Due
to the high
severity of these …

Encyclopedia entry:
Exploit:Java/CVE-2012-4681.DM – Learn more
hours ago – Summary. This threat is detected by the Microsoft
engine. Technical details are not currently available for this
threat. Top

Unpatched Java Vulnerability Exploited in Targeted
Attacks, Researchers Say

Unpatched Java Vulnerability Exploited in
Targeted Attacks, Researchers Say PCWorld (blog…has been … 

Oracle fixes Java 7 web browser flaw
Oracle fixes Java 7 web browser flaw IT PRO Software giant Oracle has finally released a patch…malware . The US government warned end users to be on their guard against Java 7 zero-day vulnerabilities … 

Oracle provides early patch for

Oracle provides early patch for Java iTWire
The next Java update was scheduled for October 16…also includes fixes
for two other vulnerabilities affecting Java running …

Update Java in Control Panel ! Oracle releases security
patch for Java vulnerability

Oracle releases security patch for
Java vulnerability Before now, the only way to
protect computers from potential malware attacks exploiting this…

Sep 3, 2012

Oracle patches Java 0-day, researchers say there is
another one

Oracle patches Java 0-day, researchers say
there is another one Posted on Aug 31, 2012 02:09 pm Oracle has finally issued
an update for Java 7 (v 1.7.0_07) which solves the problem of the
CVE-2012-4681 vulnerability…

After patch, researchers find another Java vulnerability
After patch, researchers find another Java vulnerability SC Magazine Australia Hours after the company that maintains…

Oh No Not Again! New Java Vulnerability Uncovered In
Latest Java Update

Oh No Not Again! New Vulnerability Uncovered In
Latest Java Update Forbes Adam Gowdiak, CEO and founder of Security
Explorations, has…

Sep 5, 2012

Fake Amazon emails open the way for

Fake Amazon emails open the way for malware Posted
on Sep 04, 2012 01:15 pm The CVE-2012-4681 Java zero-day vulnerability
might have been patched, but because it was added to the popular Blackhole
exploit kit and because most…

Fw: Another Java Security Flaw Appears After Oracle Patch
Another Java Security Flaw Appears After Oracle Patch TechWeekEurope…Researchers have uncovered another potentially Java security flaw, which could be used by hackers…Current Activity – US-CERT Releases Oracle Java JRE 1.7 Security Advisory ….

Rogue Microsoft Services Agreement emails lead to latest Java exploit
Rogue Microsoft Services Agreement emails lead to latest Java exploit Computerworld IDG News Service – Hackers are distributing…

Article: Thanks ever so much Java, for that biz-wide
rootkit infection

Thanks ever so much Java, for that biz-wide
rootkit infection Register Shortly after I awoke to…client called to inform me
his computer had contracted some malware . Java has, if you’ll forgive
the anthropomorphization of a bytecode virtualization…

Sep 14, 2012

Oracle confirms existence of another critical Java

Oracle confirms existence of another critical
Java flaw Posted on Sep 11, 2012 03:45 pm When Oracle finally patched the
CVE-2012-4681 Java 0-day that was being actively exploited…

Nov 2, 2012

Jacksbot Java malware can take control of Windows, Mac,
and Linux systems

Jacksbot Java malware can take control of
Windows, Mac, and Linux systems The Next Web…software company Intego
discovered malware which it classified as “a new Java backdoor trojan
called Java/Jacksbot.A.” New threats are discovered all…

Nov 24, 2012

Warning out vs new cross-platform

…vendors warned computer users over the weekend
against a new malware that can potentially affect various platforms that support
Java. In a blog post, Trend Micro pointed out …

Jan 3, 2013

Java server malware targets Windows systems
Java server malware targets Windows systems SC Magazine Researchers have discovered a backdoor delivered by a malicious JavaServer Page (JSP), which targets vulnerable Java-based HTTP servers and allows an attacker to hijack infected systems. The malware…

Jan 12, 2013

New malware exploiting Java 7 in Windows and Unix systems
New malware exploiting Java 7 in Windows and Unix systems CNET The malware has currently been seen…OS X, may be able to do so given OS X is largely similar to Unix and Java is cross-platform. Additionally, the exploit is currently being …

Java flaw poses malware threat to PC users
Java flaw poses malware threat to PC users Financial Times A serious flaw in the Java software found on most personal computers could expose the machines to being…

New Java 0-day exploited in the wild
New Java 0-day exploited in the wild Posted on Jan 10, 2013 04:45 pm A new Java zero-day being exploited in the wild has been found. With the files we were…

Disable Java! Recent 0-day exploit is included in exploit kits
Disable Java! Recent 0-day exploit is included in exploit kits Posted on Jan 11, 2013 06:00 pm The Java zero-day that has recently been spotted being exploited in the wild has turned…

Jan 13, 2013

US-CERT Releases Oracle Java 7 Security

Fw: US-CERT Current Activity – CERT Releases Oracle
Java 7 Security Advisory…Vulnerability Note VU#625617 to address a
vulnerability in Oracle Java Runtime Environment (JRE) 7 and earlier that
is currently…

Jan 15, 2013

Week in review: Java 0-day wreaking havoc, hiding
messages in Skype silences, Apple prevents popular app scam

Week in review: Java 0-day wreaking havoc,
hiding messages in Skype silences, Apple prevents popular app scam tactic Posted
on Jan 14, 2013 06:00 am…

US-CERT – Out-of-Band Patch to Address Java 7
Vulnerability Released

…Current Activity – Oracle Releases Out-of-Band
Patch to Address Java 7 Vulnerability…band patch to address the
recently announced vulnerability in Java Runtime Environment (JRE) 7.
US-CERT encourages users and…

Security: Homeland Security Warns About Java

Homeland Security Warns About Java Malware Live A newly-discovered vulnerability

How To disable Java in my web

How do I disable Java in my web browser?…Macintosh OS X
•Browser(s): Internet Explorer, Firefox, Chrome, Safari •Java version(s):
7.0, 7u10+ FULL INSTRUCTIONS (easy) …..

Jan 16, 2013

Oracle patches critical 0-day with new Java

Oracle patches critical 0-day with new Java
update Posted on Jan 14, 2013 01:05 pm Oracle has released Java 7 Update
11, the computing platform’s newest version that patches…

Oracle delivers 86 security

…fixes Posted on Jan 16, 2013 10:06 am Oracle has
had two major updates in the last 2 days. On Sunday, Jan. 13 a new version of
Java 7 was released that addresses the 0-day vulnerability that has been
exploited in the wild. The Oracle C…

Surprised? Old Java exploit helped spread Red October

Surprised? Old Java exploit helped spread Red October spyware Register Unpatched Java installations…October on
Monday, …

Malware masquerades as patch for

Malware masquerades as patch for Java Hackers often disguise their malware as a legitimate…

Jan 21, 2013

Java Security ‘Fix’ Is Disguised Malware

Java Security ‘Fix’ Is Disguised Malware
Attack InformationWeek The malware may be…against browsers. The attack begins
with a Web page warning that a newer version of Java is required to …

Newest Java update doesn’t fix fresh critical

Newest Java update doesn’t fix fresh
critical vulnerabilities Posted on Jan 21, 2013 03:26 pm Another week, another
zero-day threatening millions of Java users. As you might remember, last
week Oracle released Java 7 Update 11, which…

Jan 28, 2013

Beware of fake Java

Beware of fake Java updates CNET January 22,
2013 9:30 AM PST. Following recent security vulnerabili…vulnerabilities in
Java, malware developers are taking a new approach to exploit the
Java platform by issuing false updates that pose as legitimate updates
for the…

Java’s new “very high” security mode can’t protect you
from malware

Java‘s new “very high” security mode can’t
protect you from malware Ars Technica Security researchers have uncovered a
newly discovered bug in Oracle’s Java framework that allows attackers to
bypass important security protections designed…

Feb 2, 2013

US-CERT- Oracle Releases Out-of-Band Patch to Address
Java 7 Vulnerabilities

…Current Activity – Oracle Releases Out-of-Band
Patch to Address Java 7 Vulnerabilities —–Original Message—– From:
Current…out-of-band patch to address multiple vulnerabilities in the
Java Runtime Environment (JRE) 7 Update 11 and earlier. These

Security: Firefox will block by default nearly all

Firefox will block by default nearly all plugins
Posted on Jan 30, 2013 08:08 pm Following the recent debacle of the critical
Java 0-day that was being actively exploited in the wild, in an attempt
to minimize its users’ attack surface Mozilla has enabled “Click…

Feb 6, 2013

Oracle rushes out emergency Java

Oracle rushes out emergency Java patch
Posted on Feb 04, 2013 01:44 pm If you’re still among the users…computer, be
advised that Oracle has released a critical patch update for Java SE
(Java 7 Update 13) on Friday. …

Feb 18, 2013

Facebook disables Java after

Facebook disables Java after hack
VentureBeat The malware came through another issue with Java…Department
of Homeland Security even recommended that people uninstall Java since
hackers were finding new …

Feb 20, 2013

Apple issues malware removal tool today,

…tool today The Verge “Apple has identified
malware which infected a limited number of Mac systems through a vulnerability
in the Java plug-in for browsers,” the company said in its statement.
“The malware was employed in an attack against Apple and other companies…

Apple victim of malware

…malware attack. A small number of systems inside
the company were compromised. The malware attack was tied to a vulnerability in
a Java plug-in for browsers, Apple said in a statement sent via email.
“There is …

Feb 22, 2013

US-CERT Updated Release of the February 2013 Oracle Java
SE Critical Patch Update

…Current Activity – Updated Release of the
February 2013 Oracle Java SE Critical Patch Update —–Original
Message—– From…an updated February 2013 Critical Patch Update for Oracle
Java SE to address a vulnerability. This vulnerability could allow…

Apple Releases Code To Remove Java Hack

Apple Releases Code To Remove Java Hack
Malware Fast Company In the wake of this attack Apple…malware. The Apple hacks
happened when a vulnerability in Java, …

Latest Mac malware attack shows that Windows 8 is more
secure ?

…blog) Apple has admitted that Macs inside the
company were recently victimized by a malware attack. They were hacked in a
drive-by Java exploit. In response, Apple patched the security hole in
older systems vulnerable to the attack, and also released a tool …

Uninstalling the Terrible Ask

…your computer, don’t be ashamed – it could
happen to anybody. Especially considering that is bundled with the equally awful
Java runtime. Those people should be ashamed of themselves. ….

Mar 2, 2013

Java malware sets its sights on your Minecraft

Java malware sets its sights on your
Minecraft passwords Geek This piece of malware is quite a bit more
sophisticated, too. It’s made of multiple Java applets that are hidden
after being dropped onto a compromised system. The tool…

New Java 0-day exploited in ongoing

New Java 0-day exploited in ongoing attacks
Posted on Mar 01, 2013 03:48 pm FireEye has detected yet another Java
zero-day vulnerability being exploited in attacks in the wild. Affected

Recommended Settings and use of CCleaner – Temporary Internet Files Clean Up Browsers, Applications

Recommended Settings and use of CCleaner – Temporary Internet Files Clean Up Browsers, Applications


CCleaner – Wikipedia, the free encyclopedia (very popular, safe,
CCleaner supports the cleaning of temporary and unneeded files from
certain …


BetterPrivacy :: Add-ons for Firefox
Customize Firefox, Thunderbird, and other Mozilla products with
thousands of … Better Privacy serves to protect against not deletable
long term cookies,….
….deletes flash cookies that none others generally delete. Cookies
should only be given session cookies permissions as a privacy and
security issue (cookies have been broken into by malwares) and only if

( CCleaner is for newbies and is indeed a Power User software utility
for the advanced user as well ! )



# Check all for Internet Explorer (ALL ! )

# Recent Documents, Search Autocomplete, Other MRUs
(Do NOT click Network Passwords as no doubt this will keep deleting any
Router type passwords in the system and you will have to keep typing in
the Network Security Key (router password) each use.

# Empty Recycle Bin (IF you are sure you do not need to recover mistaken
deletions here. Be sure or do NOT check and simply open Recycle Bin and
delete manually)
# Clipboard
# TEMPORARY FILES IS SPECIAL….. CCleaner only deletes these after they
Instead you can click this and then DO NOT CLICK RUNCLEANER BUT RATHER
CLICK “ANALYZE” which will not delete anything but scan and present what
is available for deletion. If you see anything under around 100M size of
files you are okay. UNLESS you have the Windows Updates icon in the
bottom tray that says you have Updates to install – THEN anything over
100M size files total present may indicate malware present and has been
running for awhile creating these.

Temporary Internet Files – Windows Temp Files, Safe To Delete ?
January 14, 2010 — bluecollarpc


# CHECK ALL EXCEPT “Compact Databases”

# CHECK ALL (According to what you have installed – example: Adobe
Reader history)

# CHECK ALL (histories)

# CHECK ALL (histories)

# OPTIONAL – You can check these or not if you wish to review using
these and do not want the histories (logs) deleted.


{TIP: When using ANALYZE make sure you have clicked Run Cleaner and THEN add the items you wish to check without deleting with ANALYZE. Otherwise you will be looking at all the junk files you would normally delete anyway and will muddy the results of an Analyze scan as then you will just see the particular files you wanted to investigate WITHOUT all the other junk files added in the Analyze results.}


# Memory Dumps, Chkdsk File Fragments
…. both of these should be left UNCHECKED as they will invariably only come into play at the rare Computer Crash event. This will inevitably create some special helpful information files of the event (annonymous) that will help Microsoft (or others involved – softwares, browsers, causes – annonymous) that may send out invisibly at the next computer start up.
(There are settings in the Control Panel to turn these off or on – reports – RECOMMENDED to leave ON to be a help to all computer users for causes of these undesirable events that they may create patch/fix/updates to prevent the occasion from occurring again for all) .
(After the computer seems to be working again okay – you may want to check these and then click ANALYZE to see if there are any items here available per scan to delete safely. They would be really small no doubt in size not really affecting overall performance memory wise.)

# Windows Log Files …..are safe to delete, DO NOT click this as a regular clean up each time. These Logs are created automtically by Windows and can contain some information recent events that may be EXTREMELY HELPFUL to discover problems that can be easily fixed. Time to time the computer has been working fine would THEN be a time to ADD THIS to the Run Cl;eaner clean up. It will save nominal disk space as these are never really that big and in text only. The first clean up of these may be a large clean up as to 1M to 10M even at first run and if the computer is a couple years old. (They do pile up needlessly. ) TRY the CCLeaner Analyze first to see files size as example. OTHERWISE LEAVE UNCHECKED ! ! !

# DNS Cache, Font Cache ….. LEAVE UNCHECKED and do not use unless directed to by an at least Advanced User or Tech professional.

# Shortcuts…. DO NOT use this and simply delete those manually as many normal icons you use will suddenly disappear be using this to delete them. For power users building their own custom systems , this may be a desirable action to use this deletion feature.



gerald philly pa usa

Webmaster/malware removal help
Membership/Join List:
Free Malware Removal Help / A Community Website Since 2005

How To Delete Java Temporary Files – Avoid Java Malware Exploits

As well in security it is also recommended to go to Start > Control Panel > Java and open the Java panel and click “Do Not Store Temporary Files On This Computer”  ….

….Malware as well has used Java to infect computers (AND FIREFOX ! ) and can hide in these temporary files in the system. This will not affect navigation at all. These are like Temporary Internet Files and are stored for re-visit to a website to load it just a tad faster as the Temporary Internet Files are used for and stored for those reasons. These are junk/trash files completely safe to delete. (In other words when going to a website – any images and pictures and some text items are stored on the computer as well as the cookies files. When re-visiting that same website – these are uploaded from the computer rather than re-downloading then over the internet each time which makes the loading of the website page a tad faster. In real world – it is like nano seconds of no real noticeable speed to the naked eye. )

%d bloggers like this: