Tampilkan postingan dengan label how. Tampilkan semua postingan
Tampilkan postingan dengan label how. Tampilkan semua postingan

Desktop How to purchase Canon Computer Systems 1033B005 Value Pack Ink Pro 9500

Where to buy Canon Computer Systems 1033B005 Value Pack Ink Pro 9500 For the Buy

Reviews: Canon Computer Systems 1033B005 Value Pack Ink Pro 9500

Canon Computer Systems 1033B005 Value Pack Ink Pro 9500

Canon Computer Systems 1033B005 Value Pack Ink Pro 9500 In the Search

Prints high-quality documents and presentations with ease. Produces sharp edges and smooth shading. Easy installation saves time and money. Supply Type: Ink; Color(s): Cyan; Green; Magenta; Matte Black; Photo Black; Photo Cyan; Photo Magenta; Red; Yellow; Device Types: Inkjet Printer; Ink Yield: N/A.

Read more »
Read More..

Most Dangerous Types of Spyware How to Choose Anti Spyware

Bad News - the Threat is Bigger than it Seemed
How recently it was – when even many journalists thought that spyware gathers mostly information to be used for targeted advertising. Definitions like "spyware, a.k.a. adware, is…" were pretty common in articles. Keyloggers and system monitors were mentioned as dangerous, but relatively rare. Until the Spy Audit survey made by ISP Earthlink and Webroot Software clearly showed - they are not rare at all.
The results of the survey are here:
http://www.earthlink.net/spyaudit/press/ and [http://www.earthlink.net/about/press/pr_spyauditsurvey/]
Reading them will be time well-spent for everybody who uses Internet and at least sometimes deals with information valuable enough to be stolen; in fact, it means just everybody.
"Industry experts suggest that these types of programs [i.e. spyware in general] may reside on up to 90 percent of all Internet-connected computers" – thats the exact quote. Considering the number of computers scanned during this survey (which lasted for a whole year 2004), there is nothing left but to come to the conclusion – it must be true to fact.

Despite the fact that one of the Spy Audit authors is an anti-spyware vendor, there is no doubt that the results are trustworthy – there has been more than 4.6 million system scans made in 2004. It seems that the results of the survey might be like the bolt from the blue even for the specialists, not to mention general public.
16.48% of all scanned consumer PCs in 2004 had a system monitor installed. It means that 16.48% of these users were definitely under monitoring (who monitors them – thats another question). 16.69% had a Trojan horse program, and this is a troubling sign, too – it is a keylogging module that Trojans often have inside. "Information-stealing Trojan" in descriptions most often means "keylogger-containing Trojan". Both figures give us an overwhelming 33.17% PCs contaminated with some program with information stealing capability. Even if not all these Trojans were information-stealing ones, the situation is distressing anyway.
Schools of Phish and Herds of Trojan Horses
"Traditional" phishing and spoofing (sending emails linked to a bogus bank Web site and waiting for unwitting customers) are, unfortunately, not new phenomena. It is a modernized two-stage scam which includes contaminating the victims machine with a keylogger-containing Trojan horse program that is spreading like a wildfire now.
This scheme is without doubt much more dangerous; in this case the victim neednt follow the link in the email. Trojan horse lurks in the background until the victim types particular titles or URLs into his browser. Once the user visits one of a number of banking Web sites the malicious code is triggered into action, capturing passwords and taking screenshots. Then the information is sent to remote hackers who can use it to break into the bank account and steal money.
There were several outbreaks in activity of such information-stealing Trojans which targeted bank customers in 2004. Actually, such a scam was first used in Brazil – when the notorious Trojan named Troj/Banker-AJ appeared, experts recalled that the security firm Sophos had warned earlier in 2004 about criminals who used similar techniques to break into Brazilian online bank accounts.
Crooks may use pretty ingenious and "efficient"(if such a word could be appropriate for this activity) techniques to place the Trojan into users PCs – letters can be mimicking CNN news alerts, or offering to reserve the very latest book about Harry Potter in the series before it is published in July. Who knows what will they invent next?
Looking for Solutions to the Problem
In 2004 it become as clear as day to anyone - from being not much more than a nuisance for PC users, spyware turned into one of the major threats to information security. Since the Internet has become a part of daily life and business, rapid growth of such kinds of cybercrime as identity theft and phishing endanger the whole society. Some types of spyware, namely software capable of stealing valuable information (like passwords, SSNs), certainly facilitate these crimes.
Software vendors by all means are responding to the threat to meet the enormous demand for anti-spyware protection.
Several big anti-virus vendors, such as Norton and McAfee, have already begun providing anti-spyware protection as well. Microsoft also joined the anti-spyware market this year (and has already become a target for the malicious Trojan called Bankash-A; fortunately, no serious damages reported so far). Symantec plans to announce new features to fight spyware in some of its enterprise antivirus and intrusion prevention products.
Besides, there also are – literally - hundreds of stand-alone anti-spyware developers and vendors. The number of anti-spyware software they all develop, promote and sell is constantly growing - and will grow in future. So will the profits. According to predictions from the market advisory firm IDC, the market for anti-spyware solutions is expected to boom in the next few years. Anti-spyware software revenues will soar from US$12 million in 2003 to $305 million in 2008.
But what about end users – are they going to benefit from such a variety of anti-spyware solutions available at the market? Or will they just feel bewildered and lost in all this mass of ads offering instant relief from nasty and dangerous spyware? It looks like most people are already confused because advertising is pretty much alike – how to distinguish a high-quality product from some hit-or-miss software developers fabricated in haste just to get quick profit?
What a user can (actually must) do is to know what exactly he or she is buying or installing for free. Here are several simple common-sense tips:
The first step is to visit the site of the company that produces this product. Look it through. Read "about us" section. How long does this company exist? Ignore "testimonials" – there is no guarantee that it wasnt the companys PR manager who wrote them. It would be better to search, say, Google groups for opinions.
A good old background check will also do a lot of good. It takes some time, though – but peace of mind later is worth half an hours browsing the Web now. The simplest way is to search for the products name along with such words like "installs", "spyware", "adware", "popups", etc.
There are even lists of suspicious, low-performing, or adware-installing products. See, for example, http://www.spywarewarrior.com/rogue_anti-spyware.htm - an ample list of anti-spyware youd better not buy. By the way, the whole this site is worth studying thoroughly.
The fact that you are not a tech person doesnt mean you can afford not knowing the basic principles these products are based on. What a user can expect from an anti-spy product and what is simply impossible?
Most anti-spyware products apply signature databases, i.e. rely on simple pattern-matching technique. Detecting spy software is the crucial step of the whole process – all the protection depends on whether the anti-spy software is able to detect as many malicious programs as possible. The bigger the database is and the more often it is updated, the more reliable protection the product will provide.
Signature base, which most anti-spy products depend on, is actually the "list" of signatures – small pieces of spy programs codes. Anti-virus or anti-spy program actually scans the system and compares its codes with those in signature bases. So, in this case only the spies whose signatures already are in the base will be detected and eventually "caught". As long as anti-spy software is regularly updated and the system doesnt come across some unknown spy product, everything is all right.
The problem is that there is good deal of people capable of creating something brand-new, unknown to anti-spyware developers. The period of time when a new spy already exists, but the updates have not been released yet, is the very time when cybercriminals make their biggest profits.
The advantage of signature base analysis is that programs based on this method of detection can be of wider range – it is possible to include signatures from different types of spyware and adware into a single database. However, regular release of updates for these bases becomes crucial. If the developer fails to do it properly and on time, there is a considerable risk for such a program to become "Jack of all trades and a master of none."
The conclusion is simple – if a product applies signature database, its better to choose anti-spyware with the biggest and most frequently updated base. Dont expect absolute protection – with this technique it is simply unattainable.
But in case of information-stealing programs, like keyloggers or keylogging-containing Trojans, a single "overlooked" program may mean lost valuable data. Since signature analysis cant ensure protection against constantly appearing brand-new keyloggers, blocking the very process of keylogging would be better. Such a technology already exists, and it may be the next step towards more reliable protection against the most malicious types of spy programs.


Article Source: http://EzineArticles.com/14596
Read More..

How to Remove Windows Risk Eliminator Uninstall Guide

Windows Risk Eliminator is a malicious program that uses a number of misleading techniques to make a hefty profit out of unsuspecting victims. This program is classified as a rogue security tool because it pretends to scan your computer for malware and reports system threats which do not even exist. Cyber-criminals spread their malware through the use of Trojan Downloader and fake online scanners. Victims are typically tricked into paying for additional tools or services. This rogue costs almost $80 with a lifetime support. You can get perfectly legitimate anti-malware software for about $40. Windows Risk Eliminator gives a false sense of security. It displays fake security alerts and notifications saying that your computer is infected with some sort of malware. Furthermore, Windows Risk Eliminator claims that you can make your computer run faster if you pay for a additional tools that will fix numerous system/registry errors. Please do not fall victim to this scam and remove Windows Risk Eliminator from your computer as soon as possible. What is more, this scareware blocks other programs on the victims computer. It blocks web browsers, task manager, registry editor and of course anti-malware software. Thankfully, weve got the step-by-step removal instructions to help you to remove Windows Risk Eliminator malware. Last, but not least, if you have purchased this bogus program, please contact your credit card company and dispute the charges. If you need help removing Windows Risk Eliminator, please leave comment. You can post additional information about this rogue too. Good luck and be safe online!

Windows Risk Eliminator is from the same family as Windows Universal Tool, Windows Utility Tool, and Windows Security & Control.



Fake Windows Risk Eliminator scan results:


Fake security alert saying that taskmgr.exe is a key-logger:


A web form where you can purchase Windows Risk Eliminator:



Windows Risk Eliminator removal instructions:

1. Rename the main executable of Windows Risk Eliminator:

In Windows XP:
C:Documents and Settings[UserName]Application Data[SET OF RANDOM CHARACTERS].exe

In Windows Vista/7:
C:Users[UserName]AppDataRoaming[SET OF RANDOM CHARACTERS].exe



Look for htwlfy or similar file and rename it to malware. Then restart your computer. This should disable Windows Risk Eliminator. After reboot, please continue with the rest of the removal process. NOTE: By default, Application Data folder is hidden. If you can find it, please read Show Hidden Files and Folders in Windows.

OR you can download Process Explorer and end Windows Risk Eliminator process.

2. Download shell-fix.reg. Double-click to run it. Click "Yes" when it asks if you want to add the information to the registry. This file will fix the Windows Shell entry.
3. Download free anti-malware software from the list below and run a full system scan.
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Dont forget to update the installed program before scanning.

4. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET NOD32 Antivirus.


Alternate Windows Risk Eliminator removal instructions (in Safe Mode with Networking):

1. Reboot your computer is "Safe Mode with Networking". As the computer is booting tap the "F8 key" continuously which should bring up the "Windows Advanced Options Menu" as shown below. Use your arrow keys to move to "Safe Mode with Networking" and press Enter key. Read more detailed instructions here: http://www.computerhope.com/issues/chsafe.htm


NOTE: Login as the same user you were previously logged in with in the normal Windows mode.

2. Download free anti-malware software from the list below and run a full system scan.
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Dont forget to update the installed program before scanning.

3. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET NOD32 Antivirus.


Associated Windows Risk Eliminator files and registry values:

Files:

In Windows XP:
  • C:Documents and Settings[UserName]Application Data[SET OF RANDOM CHARACTERS].exe
In Windows Vista/7:
  • C:Users[UserName]AppDataRoaming[SET OF RANDOM CHARACTERS].exe
Registry values:
  • HKEY_CURRENT_USERSoftwareMicrosoftWindows NTCurrentVersionWinlogon "Shell" = "%UserProfile%Application Data[SET OF RANDOM CHARACTERS]"
Share this information with other people:
Read More..

How To Repair Laptop Notebook Keyboard

This time the discussion was about how Service Keyboard Laptop/Notebook. This article we get from the experience of our friends. Accident damaged laptop keyboard HP Compaq branded this time. Lets find out together.


Prior to the discussion of How Service Keyboard Laptop/Notebook, we discuss some of the causes of defective first laptop/notebook keyboard, namely:
  • The keyboard is exposed to water
  • Due to dust
  • Due to the humid room.
The damage often occurs on laptop/notebook keyboard is one of the keys of the keyboard are not functioning or even laptop/notebook keyboard was broken it was moving on its own like there are pushing it down.

This occurs due to sticking to the second layer of carbon on flexible keyboard (due to a fungus or dirty) so that the keyboard keys can be pressed, or even can not be used at all.

Faulty keyboard characteristics are the repeated beeps sound when laptop is turned on.

Heres how the Service Keyboard Laptop/Notebook:

  • Prepare a small cutter which is still new (sharp)
  • Specify the keyboard keys are roughly problematic. In this case a broken tab button.
  • Take the keyboard keys are broken by tilting and grab a rubber imaginable underneath.
  • There are 2 rubber under a layer of carbon is circular. Ripped a third circle of carbon deposits.




  • Clean the carbon deposits between the two with a cutter that, by way of a swipe, but do not be too hard, just only remove dirt between the two layers of carbon. If its too hard carbon coating were feared lost.
  • The Keyboard is ready to try, and if it is OK, you may reattach the rubber buttons and keyboard.

Good Luck.


Read More..

Securekeeper Spyware Removal How to Get Rid of This Malicious Program Now

SecureKeeper, also known as Secure Keeper, is one of many rogue antispyware programs that is promoted by the use of Trojan viruses, which is still one of the most dangerous computer threats that exists. These Trojan viruses pretend to be video or flash updates that are necessary, but they will install SecureKeeper instead. These viruses then configure SecureKeeper to start automatically and wreak havoc on any computer that it is installed on. Like other rogue spyware removal programs, the cleaner will run thoroughly and then tell you that you have a laundry list of viruses, spyware threats, and other malicious threats. However, it will go on to inform you that you need to purchase the program in order to remove the threats that are present on your computer.
Here are a few things to remember when it comes to dealing with programs like SecureKeeper. 


  • If you already have antivirus and antispyware software installed and in use (from Norton, Computer Associates, WebRoot, or other companies), then you should be well taken care of. This rogue program and others like it are just out to scam you into buying something that you dont need. Click on the X in the upper right corner to close scam pages, or use the Windows Task Manager to close them. Then, run your own antispyware and antivirus software removal tools. It is important that you have both antispyware and antivirus software installed on your computer for complete protection.
  • Windows comes with a firewall, a malicious software removal tool, and other security features. Make sure that they are enabled to work and updated and you will not have as many problems with rogue programs like SecureKeeper.
  • If you are not sure about any screens that pop up on your computer, do not click on them. That is the worst thing that you can do. Instead, ignore these popups and run a security scan to determine if your computer has been compromised.
  • Manual removal of SecureKeeper is very detailed and needs to be done right in order to completely remove the spyware. Be especially careful when modifying and deleting Windows registry entries.
To remove SecureKeeper, you can install a legitimate antispyware program that will detect and delete all associated malicious files. Update the threat database of the antispyware program before running a scan. This automatic removal process is recommended over the manual process of removing SecureKeeper. If you have proper antivirus and antispyware protection in place, you can lower or eliminate your chance of having to deal with future spyware infections.


Article Source: http://EzineArticles.com/3315969
Read More..

Fedora 15 KDE How to upgrade to KDE 4 7

As a Fedora KDE user we sometimes have to wait that bit extra for KDE updates, nonetheless the efforts by the Fedora KDE team are much appreciated.

My Fedora 15 KDE 4.7 Desktop

I no longer use openSUSE, it has gone too sour for my liking and is surrounded by a lot of negativity. I am one of those who believe the negative energy of others can have a big impact on ones well being and since giving openSUSE the boot I have been feeling much better.

The how to...

The steps for upgrading KDE to version 4.7 was originally brought to my attention by browsing the Fedora Forum, see the post by ah7013. I have modified the steps slightly as those of us who installed Fedora KDE from the Live CD do not have wget installed.

Please note, KDE 4.7 is not in the Fedora 15 stable repository and the guide  will install KDE 4.7 from a repository created by Rex Dieter, a valued member of the Fedora KDE team.

Open a terminal and run the following commands,

cd /etc/yum.repos.d
su -c yum install wget
su -c wget http://repos.fedorapeople.org/repos/rdieter/kde47/fedora-kde47.repo
su -c yum update

Please reboot your system.

Enjoy KDE!

Read More..

How to Convert InputStream to Byte Array in Java 2 Examples

Sometimes we need to convert InputStream to byte array in Java, or you can say reading InputStream as byte array, In order to pass output to a method which accept byte array rather than InputStream. One popular example of this, I have seen is older version of Apache commons codec, while converting byte array to hex string. Though, later version of same library do provide an overloaded method, to accept InputStream. Java File API provides excellent support to read files like image, text as InputStream in Java program, but as I said, sometime you need  need String or byte array, instead of InputStream . Earlier we have seen 5 ways to convert InputStream to String in Java , we can use some of the techniques from there while getting byte array from InputStream in Java. If you like to use Apache commons library, which I think you should, there is a utility class called IOUtils, which can be used to easily convert InputStream to byte array in Java. If you don't like using open source library for such kind of thinks, and like to write your own method, you can easily do so by using standard Java File API. In this Java tutorial we will see examples of both ways to convert InputStream to byte array in Java.
Read more »
Read More..

How to get environment variables in Java Example Tutorial

Environment variables in Java
There are two ways to get environment variable in Java, by using System properties or by using System.getEnv(). System properties provides only limited set of predefined environment variables like java.classpath, for retrieving Java Classpath or java.username  to get User Id which is used to run Java program etc but a more robust and platform independent way of getting environment variable in Java program on the other hand System.getEnv() method provide access to all environment variables inside Java program but subject to introduce platform dependency if program relies on a particular environment variable. System.getEnv() is overloaded method in Java API and if invoked without parameter it returns an unmodifiable String map which contains all environment variables and there values available to this Java process while System.getEnv(String name) returns value of environment variable if exists or null. In our earlier posts we have seen How to get current directory in Java and  How to run shell command from Java program and in this Java tutorial we will see how to access environment variable in Java.

How to get environment variables in Java - Example

How to get value of environment variable in Java - example tutorialHere is a quick example on How to get environment variable in Java using System.getEnv() and System.getProperty(). Remember System.getEnv() return String map of all environment variables while System.getEnv(String name) only return value of named environment variable like JAVA_HOME will return PATH of your JDK installation directory.

/**
 * Java program to demonstrate How to get value of environment variables in Java.
 * Dont confuse between System property and Environment variable and there is separate
 * way to get value of System property than environment variable in Java, as shown in this
 * example.
 *
 * @author Javin Paul
 */


public class EnvironmentVariableDemo {  

    public static void main(String args[]){
   
      //getting username using System.getProperty in Java
       String user = System.getProperty("user.name") ;
       System.out.println("Username using system property: "  + user);
   
     //getting username as environment variable in java, only works in windows
       String userWindows = System.getenv("USERNAME");
       System.out.println("Username using environment variable in windows : "  + userWindows);
   
     
     //name and value of all environment variable in Java  program
      Map<String, String> env = System.getenv();
        for (String envName : env.keySet()) {
            System.out.format("%s=%s%n", envName, env.get(envName));
        }

    }
     
}

Output:
Username using system property: harry
Username using environment variable in windows : harry
USERPROFILE=C:Documents and Settingsharry
JAVA_HOME=C:Program FilesJavajdk1.6.0_20
TEMP=C:DOCUME~1harryLOCALS~1Temp


Getting environment variable in Java – Things to remember
Java is platform independent language but there are many things which can make a Java program platform dependent e.g. using a native library. Since environment variables also vary from one platform to another e.g. from windows to Unix you need to be bit careful while directly accessing environment variable inside Java program. Here are few points which is worth noting :

1) Use system properties if value of environment variable is available via system property e.g. Username which is available using "user.name" system property. If you access it using environment variable directly you may need to ask for different variable as it may be different in Windows  e.g. USERNAME and Unix as USER.

2) Environment variables are case sensitive in Unix while case insensitive in Windows so relying on that can again make your Java program platform dependent.

3) System.getEnv() was deprecated in release JDK 1.3 in support of using System.getProperty() but reinstated again in JDK 1.5.

Thats all on how to get environment variable in Java. Though you have convenient method like System.getEnv() which can return value of environment variable, its better to use System.getProperty() to get that value in a platform independent way, if that environment variable is available as system property in Java.

Other How to tutorials from Javarevisited Blog
Read More..

How to get current URL parameters and Hash tag using JQuery and JavaScript

While dealing with current URL, many time you want to know what is the current URL path, What are the parameters, and what is the hash tag on URL. Hash tag is pretty important, if you are implementing tab structure using HTML and JQuery. To avoid confusion, let's take an example of URL: http://javarevisited.blogspot.com/2013/01/top-5-java-programming-books-best-good.html#ixzz2PGmDFlPd, in this example ixzz2PGmDFlPd is hash tag. Now, both JavaScript and JQuery provides convenient way to retrieve current URL in form of window.location object. You can use various properties of window.location JavaScript object e.g. window.location.href to get complete URL, window.location.pathname to get current path, and window.location.hash to get hash tag from current URL. If you like to use JQuery then you can get window.location as JQuery object and retrieve relevant properties using attr() function. If you are absolutely new in JQuery, and unaware of power of one of the most popular JavaScript framework, Head First JQuery is a good starting point. Being a fan of head first book, I always approach a new technology by an Head first title, it helped to learn a lot in short time, without spending time in trivial examples. By the way, In this web tutorial, we are going to retrieve current URL and hash tag using JavaScript and JQuery.
Read more »
Read More..

Spring Framework Tutorial How to call Stored Procedures from Java using IN and OUT parameter example

Spring Framework provides excellent support to call stored procedures from Java application. In fact there are multiple ways to call stored procedure in Spring Framework, e.g. you can use one of the query() method from JdbcTemplate to call stored procedures, or you can extend abstract class StoredProcedure to call stored procedures from Java. In this Java Spring tutorial, we will see second approach to call stored procedure. It's more object oriented, but same time requires more coding. StoredProcedure class allows you to declare IN and OUT parameters and call stored procedure using its various execute() method, which has protected access and can only be called from sub class. I personally prefer to implement StoredProcedure class as Inner class, if its tied up with one of DAO Object, e.g. in this case it nicely fit inside EmployeeDAO. Then you can provide convenient method to wrap stored procedure calls. In order to demonstrate, how to call stored procedures from spring based application, we will first create a simple stored proc using MySQL database, as shown below.
Read more »
Read More..

How to convert decimal to binary octal and hex String in Java Program

This article is about a simple java program which converts decimal number to binary, octal and hexadecimal format. When it was first came into my mind I though I would probably need to write whole code to convert decimal to various other radix or base numbers but when I looked Integer class and saw these two way of converting decimal to binary etc I was simple amazed. It’s indeed extremely easy to do this in java and you can also write this program or use at it is.

Converting decimal to binary in Java Example

convert decimal number to binary in java exampleJava  has many ways to change number system of particular number, you can convert any decimal number into either binary system, hexadecimal system or octal system by following same procedure. here is code example of converting any decimal number into binary number in Java.
      
//first way      
        //decimal to binary
        String binaryString = Integer.toBinaryString(number);
        System.out.println("decimal to binary: " + binaryString);
      
        //decimal to octal
        String octalString = Integer.toOctalString(number);
        System.out.println("decimal to octal: " + octalString);
      
        //decimal to hexadecimal
        String hexString = Integer.toHexString(number);
        System.out.println("decimal to hexadecimal: " + hexString);

      
//second way
        binaryString = Integer.toString(number,2);
        System.out.println("decimal to binary using Integer.toString: " + binaryString);
      
        //decimal to octal
        octalString = Integer.toString(number,8);
        System.out.println("decimal to octal using Integer.toString: " + octalString);
      
        //decimal to hexadecimal
        hexString = Integer.toString(number,16);
        System.out.println("decimal to hexadecimal using Integer.toString: " + hexString);


Nice and little tip to convert decimal to binary or decimal to Octal, hex. This comes very handy many times when we want to do a quick conversion.

Related Java Tutorials

Read More..

What is wscript exe and how to remove it

wscript.exe - Windows-based script host by Microsoft


What is wscript.exe?


wscript.exe is a Windows service that allows you to execute VBScript files. Normally, it is not dangerous, but if a malicious script is downloaded and executed it will appear as if wscript.exe is the culprit, when it is really a separate .vbs file. Antivirus programs usually detect C:WindowsSystem32wscript.exe as the culprit, however, its not necessarily infected. It may be that your computer is infected with Worms and Trojans that attempt to execute malicious .vbs scripts. Most users, get these malware infections from SD cards, pen drives and of course infected websites. Malicious files may change Windows registry, establish connection to remove servers controlled by cyber crooks and download additional malware modules. Other issues: cant open Regedit, certain Windows options are missing, cant acces Contol Panel. Malware may also block anti-malware and Windows system utilities. You should not delete wscript.exe manually, many Windows services require it and our computer may not function properly if it cannot be found. But you should use recommend anti-malware software to remove wscript.exe related malware from your computer.







File name: wscript.exe
Publisher: Microsoft
File Location Windows XP: C:WindowsSystem32wscript.exe
File Location Windows 7: C:WindowsSystem32wscript.exe
Startup file: SYSTEMCurrentControlSetServices Windows-based script host

Read More..

How to Remove Internet Security Essentials Uninstall Guide

Internet Security Essentials is a rogue antivirus program which acts like a real virus scanner, searching your computer for malicious software and viruses. After the fake scan, it claims to have detected Trojans, spyware, adware and other malware to make you think that your computer is infected. Then Internet Security Essentials prompts you to pay a small fee to remove the threats which do not even exist. Theres no trustworthy company behind it, so you shouldnt purchase it. Besides, it gives a false sense of security. Not to mention that it wont remove any infections from your computer. What is more, Internet Security Essentials is promoted through the use of fake online scanners, drive-by downloads and other malicious software. It is not a legal and truly legitimate anti-virus. If you somehow ended up with this rogue AV on your computer, please follow the steps in the removal guide below to remove Internet Security Essentials and any related malware for free.



Internet Security Essentials is a re-branded version of Smart Internet Protection 2011 rogueware. What does this rogue program actually do? It just copies several random files into the %UserProfile% directory and then "flags" those files as malware. Some of the files that can be listed as malicious software: PE.exe, DBOLE.exe, CLSV.tmp, kernel32.exe, std.dll, grid.sys. Furthermore, Internet Security Essentials changes your Windows settings to use a proxy server that will not allow you to browse any or certain web pages. It also modifies Windows Hosts files and may even block other programs on your computer. Last, but not least, Internet Security Essentials displays fake security warnings and notifications saying that your computer is infected with dangerous malware or under attack from a remote computer.
Attention! 20 infected files detected!
Trojan.BAT.AnitV.a
Packed.Win32.PolyCrypt
SpamTool.Win32.Delf.h
Trojan-PSW.Win32.Hooker
Warning! Identity theft attempt detected
Target: Microsoft Corporation keys
System alert
Internet Security Essentials has detected potentially harmful software in your system. It is strongly recommended that you register Internet Security Essentials to remove all found threats immediately.
As you can see, Internet Security Essentials is a scam. You should not purchase it, and if you have, please contact your credit card company and dispute the charges. To remove Internet Security Essentials and any related malware, please follow the removal instructions below. Let me know if you have any questions, comments, or suggestions. You can leave a message using the contact form below. Good luck and be safe online!


Internet Security Essentials removal instructions:

1. Reboot your computer is "Safe Mode with Networking". As the computer is booting tap the "F8 key" continuously which should bring up the "Windows Advanced Options Menu" as shown below. Use your arrow keys to move to "Safe Mode with Networking" and press Enter key. Read more detailed instructions here: http://www.computerhope.com/issues/chsafe.htm


NOTE: Login as the same user you were previously logged in with in the normal Windows mode.

2. Launch Internet Explorer. In Internet Explorer go to: Tools->Internet Options->Connections tab. Click Lan Settings button and uncheck the checkbox labeled Use a proxy server for your LAN. Click OK. You may have to repeat steps 1-2 if you will have problems downloading malware removal programs.



3. Download free anti-malware software from the list below and run a full system scan.
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Dont forget to update the installed program before scanning.

4. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET Smart Security.


Alternate Internet Security Essentials removal instructions using HijackThis or Process Explorer (in Normal mode):

1. Launch Internet Explorer. In Internet Explorer go to: Tools->Internet Options->Connections tab. Click Lan Settings button and uncheck the checkbox labeled Use a proxy server for your LAN. Click OK.



2. Download Process Explorer.
3. Rename procexp.exe to iexplore.exe and run it. Look for similar process in the list and end it:
  • FN43g_392.exe
OR download iexplore.exe (NOTE: iexplore.exe file is renamed HijackThis tool from TrendMicro).
Launch the iexplore.exe and click "Do a system scan only" button.
If you cant open iexplore.exe file then download explorer.scr and run it. Search for similar entries in the scan results:

R1 - HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings,ProxyServer = http=127.0.0.1:18392
O4 - HKCU..Run: [Internet Security Essentials] "C:Documents and SettingsAll UsersApplication Data38gdr2FN43g_392.exe" /s /d
Select all similar entries and click once on the "Fix checked" button. Close HijackThis tool.

4. Download free anti-malware software from the list below and run a full system scan.
NOTE: in some cases the rogue program may block anti-malware software. Before saving the selected program onto your computer, you may have to rename the installer to iexplore.exe or winlogon.exe With all of these tools, if running Windows 7 or Vista they MUST be run as administrator. Launch the program and follow the prompts. Dont forget to update the installed program before scanning.

5. New threats appear every day. In order to protect your PC from such (new) infections we strongly recommend you to use ESET Smart Security.


Internet Security Essentials associated files and registry values:

Files:
  • C:Documents and SettingsAll UsersApplication Data38gdr2
  • C:Documents and SettingsAll UsersApplication Data38gdr2FN43g_392.exe
  • C:Documents and SettingsAll UsersApplication Data38gdr2[SET OF RANDOM CHARACTERS].dll
  • C:Documents and SettingsAll UsersApplication Data38gdr2[SET OF RANDOM CHARACTERS].ocx
  • C:Documents and SettingsAll UsersApplication DataSMEYFE
  • %UserProfile%Application DataInternet Security Essentials
%UserProfile% refers to:
C:Documents and Settings[UserName] (for Windows 2000/XP)
C:Users[UserName] (for Windows Vista & Windows 7)

Registry values:
  • HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerDownload "RunInvalidSignatures" = 1
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings "ProxyServer" = "http=127.0.0.1:18392"
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun "Internet Security Essentials"
  • HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options "Debugger" = "svchost.exe"
Share this information with other people:
Read More..

What is eGdpSvc exe and how to remove it

eGdpSvc.exe - System eSafe update service by eSafe Security Co., Ltd.


What is eGdpSvc.exe?


eGdpSvc.exe is a part of eSafe Security Control software. The file has a valid certificate issued to Banyan Tree Technology Limited by GlobalSign. eGdpSvc.exe runs as Windows service with extensive privileges which means that it may connect to remote servers and download additional files onto your computer in the background without your permission and knowledge. Its not essential for Windows and may cause problems. Besides, most of the time, this application is bundled with adware and potentially unwanted software. It may install adware and browser hijackers on your computer, for example Qvo6. Since egdpsvc.exe runs as a background Windows service it may slow down your computer a bit. Even though, software name looks reliable, this application is potentially unwanted. I recommend you to remove eGdpSvc.exe from your computer. You should scan your computer with recommended anti-malware software as well.







File name: eGdpSvc.exe
Publisher: eSafe Security Co., Ltd
File Location Windows XP: C:Documents and SettingsAll UsersApplication DataeSafeeGdpSvc.exe
File Location Windows 7: C:ProgramDataeSafeeGdpSvc.exe
Startup file: SYSTEMCurrentControlSetServices eSafeSvc

Read More..

How to Remove DNS Changer Uninstall Guide

If you havent already, we recommend that you take a few minutes to determine if your computer has been affected by the DNS Changer virus. There are still nearly half a million computers infected by this malicious software or at least using the Rove Digital domain name servers in Europe and the U.S. This DNS infrastructure was formerly used by botnet czars to redirect unsuspecting victims to infected websites, alter user searches, replace ads, block legit anti-virus software and promote fake security products. Cyber crooks earned millions of dollars display false advertisements and redirecting users to wrong websites.

The FBI arrested six Estonians who ran the botnet that infected millions of computers worldwide and took over the control of rogue DNS servers. They now produce correct DNS answers but only until March 8th, 2012 Update: DNS servers will be shut down on Monday, July 9. Thats official. The FBI will discontinue to provide this service. Then what? Infected computers will not longer be able to look up names using those name servers. In other words, users who are still affected by this DNS Changer malware wont find anything on the internet. If that had happened, Internet Explorer for example, would say something like "Internet Explorer cannot display the webpage", "No such server", etc.



While theres a slight chance that the FBI will continue to provide this service, I dont think that keeping your computer infected is a good idea. Not only DNS Changer virus causes a computer to use rogue DNS servers, it also disables security updates and blocks anti-virus software/websites. It can also change the DNS settings within small (home) office routers. As you can see, its rather sophisticated piece of malicious code that very often comes with additional payloads (Trojan.DNSChanger, Trojan.Fakealert, Trojan.Generic). It is thus very important to remove DNS Changer virus. And it isnt only the job of FBI and PC repair technicians. You have to take responsibility for your own security as well. Good luck and be safe online!


So, are you infected?

1. You can check your DNS settings by simply visiting one of the following websites:
RED = your computer is using the DNS Changer rogue name servers and is therefore probably infected.


GREEN = your computer appears to be looking up IP addresses correctly.



2. Visit FBIs website and enter your IP address: https://forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-DNS

If your computer is infected, youll see the following notification.



3. Check your DNS settings manually. If your computers DNS settings use the follow ranges, then you likely have been affected by the DNS Changer virus.

Between this IP...
... and this IP
77.67.83.1 77.67.83.254
85.255.112.1 85.255.127.254
67.210.0.1 67.210.15.254
93.188.160.1 93.188.167.254
213.109.64.1 213.109.79.254
64.28.176.1 64.28.191.254

Heres a very helpful document that explains how to check your DNS settings to see whether you are using bad DNS servers. Please see DNS-changer-malware.pdf

4. Check your router. Compare the DNS servers listed to those in the rogue DNS servers table above. If your router is configured to use one or more of the rogue DNS servers, your computer may be infected with DNSChanger malware. Please reset your router to default factory settings and change passwords.


How to restore DNS settings to default?

Changing DNS server settings on Microsoft Windows XP:

1. Go to Control PanelNetwork Connections and select your local network.
2. Right-click Properties, then select Internet Protocol (TCP/IP).
3. Right-click and select Properties.
4. Click Properties. You should now see a window like the one below.



5. Select Obtain DNS server address automatically and click OK to save the changes.

Changing DNS server settings on Microsoft Windows 7:

1. Go to Control Panel.
2. Click Network and Internet, then Network and Sharing Center, and click Change adapter settings.
3. Right-click Local Area Connection, and click Properties.
4. Select the Networking tab. Select Internet Protocol Version 4 (TCP/IPv4) or Internet Protocol Version 6 (TCP/IPv6) and then click Properties.
5. Click Advanced and select the DNS tab. Select Obtain DNS server address automatically and click OK to save the changes.


How to remove DNS Changer malware?

1. Download and run TDSSKiller. Press the button Start scan for the utility to start scanning.

2. Wait for scanning to finish. Select Cure and click Continue to cure found threat.



3. A reboot might require after disinfection. Click Reboot computer.



4. Download recommended anti-malware software (direct download) and run a full system scan to remove DNS Changer malware from your computer.

Thats it! If you have any questions or need extra help removing DNSChanger virus, please leave a comment below.

Tell your friends:
Read More..