Showing posts with label Anti Virus. Show all posts
Showing posts with label Anti Virus. Show all posts

How to increase Computer Performance?

May 20, 2012 Add Comment

How to increase Computer Performance?



Do you find that your computer is suddenly running very slow, and you wished you knew the reason why?
There are some reasons through which your computer can suddenly slow some are given below:


Reason #1:Errors In The Computer Registry Files:

It is found that almost every computer will run into speed problems if the computer registry is not cleaned regularly. The registry contains files that carry instructions for your computer to run correctly. If these files are not maintained, it is almost certain that there will be errors in them if the computer is used regularly.

How To Clean The Registry Files from your computer?

To keep your computer running optimally, it is important that you maintain your registry regularly. To do that, you should download cleaner software. This was what I did to restore my computer back to its original speed again

Reason#2: Virus Infection in your computer

Your computer might be infected with a virus, causing it to run slowly. In this case, you will need to scan your entire hard disk with an anti-virus software, especially targeting the files that you have downloaded from the internet. These files can include your email attachments as well.

 Reason#3: Spyware & Adware Infection 

Spyware and adware infections are common on computers, but it will take a lot of spyware to actually slow down your computer. Spyware are programs that track what you do online, and report back to the sites that they came from. Users whose computers are infected by spyware have no idea that they are being watched.
To clean out your computer's spyware, you can download a spyware cleaner, like Spybot Search And Destroy, from the internet, and run the software.

Cloud base application security

November 12, 2011 Add Comment

Cloud base application security



There is a growing business in "Cloud-Based" Anti-Virus and security applications.  (e.g. Panda Cloud)  Are they any good?  


Reviewers mostly say that they are.  However, all the reviews I've read so far are based on the same type of useless methodologies as most "big-name" security applications.  (For more explanation on why these testing standards are useless, see my post:  "What's the best Anti-Virus?")

My quick answer:

At this time, I believe that Cloud-Based Anti-Virus and security applications have significant weaknesses and vulnerabilities.  I definitely would NOT use one now, nor in the immediate future.  

Why: 

One of the main "benefits" touted for Cloud AV's is that the virus signature database is not stored on your PC.  Instead, it's stored on The Cloud, where it is "updated more frequently" than it would be on your PC.  Counterpoints:
The frequency of the signature database updates -- in this kind of situation -- will provide little or no "real world" improvement on the security of your PC.  In fact, it benefits the "Cloud Provider" a lot more than it does you.
For a security application to be effective, it must be able to work faster than the virus itself can work.  If the signature database resides in the cloud, even under optimum conditions, accessing the Cloud signature database will be far slower than if it resided on your PC.  Delays in accessing the signature database can have dangerous repercussions.
It is very normal for access to the Internet to be unreliable and unusually slow.
If you have no access to the Internet, your security is severely impaired or non-existent.  ...Even the publishers of these applications admit this.
Another so-called benefit of Cloud-Based Security is that it requires less "System Resources" than applications installed on your PC.  Counterpoint:
For some older Windows XP systems, this might be useful.  However, any system that is well-maintained and "Vista Compatible"-- or currently running Vista or Windows 7 -- has more than enough computing "horse-power" to provide better security using a security application installed completely on your PC.

Is there any Different between Virus & Malware?

November 08, 2011 Add Comment

Is there any Different between Virus & Malware?



Technically, no. But the difference is mostly Geek Jargon. Here's a brief background to help you understand the differences, and how they affect your choices in security software...

First, there were "Viruses". These programs self-replicated and spread without assistance. They did nasty things ranging from erasing your hard drive, to turning your screen upside down. Then came "Trojans". These programs were secretly installed by non-replicating means, and compromised the security on your computer to allow hackers direct (but hidden) access.

Next came "Spyware" and "Adware". Initially, these programs installed by sneaky-but-legal methods, but quickly devolved into more viral-like, illegal infections. Unlike viruses, these programs are not designed harm your computer. They secretly collect and report information about your browsing and purchasing habits, and/or generate those pop-ups advertisements we all know and hate. However, they DO often slow down your PC, and sometimes damage your system software while installing.

From these basic classifications sprung hundreds of variations and combinations, with two or three jargon terms for each of them. They were grouped into classifications by the burgeoning security software industry, which (of course) made absolutely no attempt to standardize them. A few people (myself included) started promoting the term "malware" as a general term for all MALicious softWARE. But the industry hijacked the term to apply specifically to the Spyware-Adware type of infections.

End result: The differences between "Viruses" and "Malware" are vague an confusing. However, for practical purposes, you can think of the difference primarily as legal. A "Virus" is malicious software that clearly installs itself illegally and/or for illegal purposes. "Malware" is malicious software that installs using sneaky-but-legal methods, and does not perform clearly illegal functions. Another term for this kind of software is PUP ...Potentially Unwanted Programs.

PUPs quickly became such a nuisance that a whole new industry for protection software sprung up around them. Their names usually incorporate the words "spy" or "malware".  Of course, they promoted themselves as an essential element to work alongside Anti-Virus software. However, both Malware and Viruses are detected in basically the same way, and these methods consume a lot of your computer's "horsepower".  Consequently, adding an Anti-Malware program to your computer may significantly reduce it's speed.

Today, most top-line Anti-Virus programs can now detect both Viruses and Malware. Conversely, few Anti-Malware programs also detect Viruses.  Also, the Anti-Malware companies have much less experience with Anti-Virus defense -- which is more difficult than defending against much simpler Malware.

The final difference is that "Anti-Virus" applications only delete the "viral" components of the infection.  They don't "mop-up" the leftover components.  While the leftovers do not pose a large threat for re-infection, most people (including me) are not comfortable leaving them there.

Summary:  Malware-plus-AV products (IMO) do not perform nearly as efficiently as venerable Anti-Virus products that also protect against Malware.  However, anti-malware products can perform better "mop-up" cleaning after an infection occurs, than anti-virus programs do.

On a final note, there are a number of popular, excellent, and free Anti-Malware removal programs. These are often recommended as "security" applications that can be installed alongside any anti-virus Program without impacting performance. This claim is somewhat incorrect. In their free versions these programs do not BLOCK Malware.  ...They will only REMOVE Malware AFTER it is already installed on the computer. Only the paid versions of these programs will BLOCK Malware.  Some of these programs DO include small, passive features that assist in blocking malware, but they do not actively scan files for malicious code the way that an Anti-Virus does.

Best Antivirus list

December 14, 2008 Add Comment
To protect yourself from viruses that crop up all the time, it’s important to update your antivirus software’s data definition files. Am here posting the list of Some top Anti Virus Programs which are very useful to users.

AVG Free Edition – AVG Resident Shield provides real-time protection executions of files and programs. It features a smart e-mail scanner, virus updates and virus vault for secure handling of the files which are infected by viruses. The base version for windows is Free for private and non-commercial use.

BitDefender Online Scan System – BitDefender Scan Online scans system as memory, boot sector, all files and folders and also comes with automatic file cleaning option. Overall, it scans for over 70,000+ viruses, worms, trojans and other malicious applications. Inexpensive product received excellent scores in our performance tests, although its scan speed was sluggish.

McAfee VirusScan for Windows: This antivirus package detects all virus types, including Word and Excel macros; boot-sector infections; and file, multipartite, stealth, polymorphic, and encrypted viruses.

Kaspersky Anti-Virus Personal Pro – A commonly used virus protection solution offering full protection against macro-viruses and unknown viruses. It offers reliable data integrity control and protection of e-mails from viruses.

ESET NOD32 Antivirus – ESET NOD32 Anti-virus is available as an anti-virus for small businesses, individuals and for large networks. The trialware enables the user to try the application for a period of 30 days.

avast! Home Edition – A free antivirus solution for scanning disk, CDs, in E-mail, HTTP, NNTP, IM and P2P.

Panda Antivirus Platinum – A complete virus protection package for home and business users. It comes with an easy installation and automatic protection from latest viruses.

Norton AntiVirus – Norton AntiVirus is the most popular and secure virus scanner for checking boot sector records at startup. The live update feature automatically installs new updates for regular protection against viruses.

HandyBits – A free for personal use virus ‘scanner integrator’ with features like auto-search which scans for already installed virus scanner. It scans for files using installed virus scanners there by utilizing the strengths of installed programs.

HijackThis Software – HijackThis is a small application for scanning and cleaning spyware, malware infections in computer. It enables the user to save the scan log in a txt file which can be examined later for system security analysis.

And Here are Some Online ScannersÂ

Stinger – A stand-alone application for automatic detection and removal of viruses. It acts as more of an assistance for administrators and is not meant to be a full time anti-virus replacement. It is available as freeware for Windows.

Avast! Online Scanner – An online virus scanner from alwil software for scanning files smaller than 512KB.

Dr. Web – Dr. Web is an online scanner for curing system viruses. Users can select viruses from system and can scan selected files.

BitDefender Online Scan System – BitDefender Scan Online scans system’s memory, boot sector, all files and folders and also comes with automatic file cleaning option. Overall, it scans for over 70,000+ viruses, worms, trojans and other malicious applications.

ESET Online Scanner – ESET is a powerful user-friendly scanner for removing malware from user’s computer.

Free online Trojan Scanner – An online scanner for detection and removal of Trojan horses.

F-Secure – An online virus scanner for detecting and clearing viruses.It supports Windows XP and Windows 2000.

Kaspersky Online Scanner – A fast and effective online scanner for checking individual files, folders, drives or even files related to emails.

Mcafee Virusscan Online – A trusted VirusScan service for search and display of infected files. Once the infected files are displayed McAfee scan provides detailed information about the virus, its type and removal instructions.

Symantec Security Check – An effective online scanner for testing various types of viruses and threats on user computers.

X-Cleaner Micro Edition – An online scanner from FaceTime Security Labs for different types of adware, keyloggers, Trojans and many other forms of unwanted software.The offline version includes a trial version of X-Cleaner and a deluxe version with a wide range of cleaning solutions. 

Basic Knowledge about virus

February 23, 2008 Add Comment

Basic Knowledge about virus


What Is A Virus



A virus is computer code, which makes copies of itself, without the computer user's (victim's) knowledge. Viruses attach themselves to other files or programs on the victim's computer - and often take complicated steps to disguise their presence.

- Some viruses are deliberately harmful or malicious - they carry a "payload". For example, erasing data from the victim's hard-disk.

- Other viruses simply attempt to make copies of themselves. Even these viruses can beharmful as they often have unintended consequences, and they always use computer resources (example: disk-space) without the computer user's knowledge or consent.

Very often, a virus can lay dormant for a long period of time (or until a given date), sometimes even years, before copying itself or executing its payload.

Viruses are usually designed by the virus writer to attack a particular type of computer or software. Most viruses are targeted at (and therefore can only infect) users of Microsoft operating systems (MS-DOS and Microsoft Windows) and/or Microsoft products (Microsoft Word, Microsoft Excel, Microsoft Outlook Express, etc.). However there are also viruses which affect other types of computers and software

How Viruses Spread
If a virus just stayed on the infected computer and didn't spread to other computers it wouldn't be too much of a problem (except for the unlucky victim). However just as a virus can infect the files on one computer, it can easily spread on to other computers:


-Some viruses attach themselves to program files (which may include EXE files, device drivers, etc). When the file is copied (or emailed) to another computer - it ends up being infected.


-Some viruses attach themselves to document files (most often Microsoft Word or Excel documents). These "macro viruses" use the advanced features of Word, Excel etc. to replicate themselves.


-Some viruses reside in the boot-sector of floppy or hard-disks. The boot sector is a special area of the disk, which is read and executed when the computer is started. If a computer is started with an infected floppy disk in the drive, it becomes infected.


-Some viruses send email from one computer to another, usually without the sender's knowledge. For example, these emails may be sent to people in the victim's address book or whose email address was listed on recently visited web pages. These viruses send an infected attachment with a plausible looking message. When the recipient opens the attachment, their computer becomes infected.


-Some viruses combine more than one of the above strategies and may switch between different strategies at different times or under different circumstances.

Virus Hoaxes

If you have been on the Internet for a while, you have probably received hoax virus warnings. (If you are new to the Internet, don't worry you are bound to get one sooner or later!) Hoax virus warnings are started by a person maliciously (or as a prank), but then passed on by many innocent computer users who wrongly believe they are genuine warnings and that they are helping others by passing on these messages. Most hoax virus warnings instruct the recipient to forward the warning to "everyone you know" and this is why they spread so fast. (Incidentally many people are taken-in by, and pass on other fake/hoax messages, including "opportunities", "news" or "secret information" )


If you get a virus warning or message telling you to pass it on to "everyone you
know", chances are that it's a bogus message. The most well-known virus hoax is
"Good Times".


Hoax warnings are not harmless.


- It has been known for a company's email system to be crashed by the volume of email generated by users forwarding warnings to everybody else repeatedly!


- Hoaxes waste user's time, as well as Internet resources and bandwidth.


- Some hoax virus warnings encourage users to delete files from their computers - for example - files which are not infected with any virus and may be essential to the correct operation of the computer.


-We recommend that you do not pass on virus warnings at all. If you must do then check carefully whether the warning is a hoax first! Companies should establish a clear policy that says virus warnings should not be passed on, or passed only to the IT department (which can then determine the veracity of the report) and not to all users.

Trojan Horses


The name Trojan horse comes from Homer's Illiad in which Greek warriors were able to sneak inside the walls of Troy (which they were besieging) by concealing hemselves inside a "gift" of a wooden horse.


In the computer world, a Trojan horse (often called just "Trojan") is a program (or occasionally a document) which appears to be harmless, or even useful, but actually has a malicious intent such as erasing the victim's hard-drive.


The difference between a Trojan and a virus is that:


- A virus copies itself without the user's knowledge


- A Trojan is copied by users deliberately - although of course they don't know about its hidden malicious intent. Sometimes Trojans are attached to illegal copyright violating software ("pirated software", "appz", "crackz", etc.).


Worms

Like a virus, a worm is a program that spreads itself from computer to computer without the victim's knowledge. Also, like a virus, worms may sometimes have deliberately malicious effects, although in many cases the mere fact of replication can be enough to be harmful to computers or networks. The difference between a virus and a worm is a technical one:


- A virus attaches itself to files (programs or data) on the victim's disk and spreads when these files are copied or executed.


- A worm resides in the computer's active memory and spreads from one computer to another by infecting other computers over a network connection (these days most often the network is the Internet).


Because worms use network connections to spread themselves, they can spread incredibly fast and generate massive amounts of network traffic (slowing or blocking legitimate access to the network).

Another worm in the news (July 2001) is the "CodeRed Worm" which affects Windows NT and Windows 2000 web servers. This worm takes control of infected servers and then uses them to launch "Denial Of Service" attacks against the other Internet sites. This worm has been highlighted in the press by US government officials and Microsoft. Microsoft have also made a fix available for the security hole that this worm exploits