Tips for protection against computer viruses

Antivirus     The first and necessary step is to install anti-virus protection and proper use of antivirus software. Without it, there is no protection and security of your computer. Do not wait when it will collapse under the pressure of a computer virus - especially if you use the internet. Installing antivirus software is simple in principle. Price is not an obstacle and can not be an excuse for his absence. Given that the majority of well-known manufacturers can find a few that provide antivirus software for home users for free.
 
    Antivirus software regularly scans files and computer memory. And as a rule, shows the appearance of the infected files, or computer viruses and worms. Followed by warning users and appropriate action taken in accordance with the configuration parameters that can, for example, delete the infected files. Ideally, the user will be warned in time, and prevent damage to the system. Just read the instructions carefully, and do not forget to regularly update anti-virus databases, which ensures the correct operation of antivirus software. To make this clearer, I will compare all the "medical" example.  



Some Tips Of Computer Virus

Precautionary measures 
     Will be essential, in addition to anti-virus, if in your daily work, you develop certain habits that will significantly reduce the chance of infecting your computer.
     Mass of computer worms distributed via e-mail. Therefore, under the mail Be careful. When you receive a new message from an unknown sender, do not rush to open files attached to the message! Similarly, care must be taken to messages from known senders. Especially if you get them unexpectedly. Often writers of malicious worms turn to curiosity users. So do not rush to open suspicious files attached to e-mail, even if the content promises interesting information.  
    Computer viruses and worms can be disguised in a file that supposedly contains movies, pictures, or humorous content, special attention should be paid to the file with a double extension (for example, .Exe, .Bat; .Com, .Vbs, .Doc, .Dot, .xls, .dll, .ppt, .mdb, .jpg), which clearly indicates that this could be a computer virus. When viewing an infected message your computer can not get infected because it takes to run the attached letter to the file. What compels you so akivno message.
    For file infection computer virus remains in memory as a Windows resident program and stored in Windows-files are executed. To send infected messages, computer virus to disassemble the internal format of the email databases and added to outgoing messages with an infected attachment (attach). Ie computer virus sends itself to the Internet. Similar precautions should also be saved when downloading and installing software from the Internet.  

How to protect your computer from malware and hacker attacks?

     You can protect your computer from malware and hacker attacks, if you follow these simple rules:

      *  Installed on your PC protection solution against information threats.
      *   Always install updates for your operating system and applications are designed to fill gaps in their security. If you are using Microsoft ® Windows ®, you do not need to manually download the updates every month, sufficient to establish the automatic mode - Start | Control Panel | Security Center, Windows ® (Start | Control Panel | Security Center). If you use a software package Microsoft ® Office, do not forget to install the update it regularly.
      *  If you received an e-mail message with an attached file (document Word, spreadsheet Excel, an executable file with a. EXE, etc.), do not open the attachment, if the sender of the letter you do not know. Do not open attachments unless you are expecting to get such a message. UNDER NO CIRCUMSTANCES do not open attachments sent in spam messages (spam). 

Computer virus Trojan.MSIL.Pakes.bo

Trojan. It is a Windows. NET (PE-EXE file).  
Size: 579,584 bytes.
 MD5: aac63d4ebb5e40428ae84f2addc617a2 
SHA1: e9348d3db8221f8ed118c5a0e7a3a2ebdfb3da9a
Destructive activities

When launched, the Trojan does the following:
  • creates files:
    % AppData% \ DalxI.txt
    
% AppData% \ chrome.exe
    
% AppData% \ chrome

  • creates the following registry keys:
[HKLM \ System \ ControlSet001 \ Services \ SharedAccess \ Parameters \FirewallPolicy \ StandardProfile]

"DoNotAllowExceptions" = 0

[HKLM \ System \ ControlSet001 \ Services \ SharedAccess \ Parameters \

FirewallPolicy \ StandardProfile \ AuthorizedApplications \ List]
"% WinDir% \ Microsoft.NET \ Framework \ v2.0.50727 \ vbc.exe" =
"% WinDir% \ Microsoft.NET \ Framework \ v2.0.50727 \ vbc.exe: *: Enabled: Windows Messanger"
[HKLM \ System \ ControlSet001 \ Services \ SharedAccess \ Parameters \
FirewallPolicy \ StandardProfile \ AuthorizedApplications \ List]
 "% AppData% \ chrome.exe" = "% AppData% \ chrome.exe: *: Enabled: Windows Messanger"
[HKCU \ Software \ VB and VBA Program Settings \ SrvID \ ID]
 "CBNCSPGZT2" = "chrome"
[HKCU \ Software \ VB and VBA Program Settings \ INSTALL \ DATE]
    "CBNCSPGZT2" = "<Date>"

Tools and techniques to protect information from viruses

     Computer viruses are called small-size program that can attach itself to other programs and perform unwanted actions to the user. The life cycle of a virus consists of: Introduction. Incubation period. Reproduction. Destruction. The signs of the emergence of the virus are: Slowing of the PC. You can not boot the OS. Freezes or crashes frequently the PC. Reducing the amount of free RAM. The destruction of the file structure.
     Classification of computer viruses on the principles of: Habitat. OS. Features of the algorithm. Destructive capabilities. Depending on the habitat viruses are divided into: boot, file, system, network, macro viruses, and their combination. Boot - the boot sector of the disk. File - embedded in file execution. System - occur in the module system. Networking - use network protocols and e-mail. Macro viruses infect documents, spreadsheets and presentations. OS - Affected OS.

"Doctor Web" and "Megaphone" epidemic Trojan.Winlock

     Russian developer of IT security "Doctor Web" and the company "MegaFon" announce the launch of a joint project of the epidemic Trojans extortionists family Trojan.Winlock, blocking Windows on users' computers. Now unlock your computer "MegaFon" is enough to send a free SMS to a special number. 
     Trojan.Winlock - the family of malicious programs, extortionists, blocking or impeding work with Windows and require the transfer of money to restore the attackers PC operation by sending an SMS message to a premium-billing. The spread of such viruses Trojan.Winlock and varied, but in most cases the infection occurs through vulnerabilities in web browsers when viewing the infected sites. Trojan.Winlock disables the Task Manager does not allow the boot not only in safe mode, and load another system from another hard drive of the computer. 
     Now, subscribers to the actions Trojan.Winlock unable to access the Internet from your computer, Windows will prompt to unlock your mobile phone. To get the unlock code to send to the number 5665 free SMS-message in the following format: "HHHH_YYYYYYYY" where XXXX - the number to which criminals are asked to send SMS, YYYYYY - text SMS. In response to subscribers free of charge receive the activation code unlocks Windows. When you have a phone with Internet access, you can also use the mobile site "Doctor Web" with free razblokirovschikom from Trojan.Winlock -

best Kaspersky programs to remove viruses

Kaspersky WindowsUnlocker - a special utility in the image Kaspersky Rescue Disk 10 to combat software-extortionists.                                   
   Download

______________________________________________________________

Kaspersky Virus Removal Tool - a program for treatment of an infected computer from viruses and other types of malicious programs.                                         
   Download
______________________________________________________________

TDSSKiller - treats Rootkit. Win32.TDSS; Rootkit.Win32.Stoned.d; Rootkit.Boot.Cidox.a; Rootkit.Boot.SST.a; Rootkit.Boot.Pihar.a, b; Rootkit.Boot.Bootkor.a ;
Rootkit.Boot.MyBios.b; Rootkit.Win32.TDSS.mbr; Rootkit.Boot.Wistler.a; Rootkit.Win32.ZAccess.aml, c, e, f, g, h, i, j, k; Rootkit. Boot.SST.b; Rootkit.Boot.Fisp.a; Rootkit.Boot.Nimnul.a; Rootkit.Boot.Batan.a; Rootkit.Boot.Lapka.a; Backdoor.Win32.Trup.a, b; Backdoor. Win32.Sinowal.knf, kmy; Backdoor.Win32.Phanta.a, b; Trojan-Clicker.Win32.Wistler.a, b, c; Virus.Win32.TDSS.a, b, c, d, e; Virus. Win32.Rloader.a; Virus.Win32.Cmoser.a; Virus.Win32.Zhaba.a, b, c; Trojan-Dropper.Boot.Niwa.a.                                  
   Download
______________________________________________________________

Removal recomndations for Backdoor.Win32.Banito.ayg

     A malicious program designed for remote control over an infected computer. In terms of functionality, Backdoors are similar to many administration systems designed and distributed by software developers.
     These malicious programs can do with the computer all that the author wants: send and receive files, launch and delete them, display messages, delete data, reboot the computer, etc.
     This type of malware is often used to connect computers to the victims of the so-called "botnets", centrally controlled by hackers for malicious purposes.
     Is also a group of Backdoors which are capable of spreading via networks and infecting other computers as Net-Worms do. Distinguishes such Backdoors worms is that they do not propagate through the network automatically (as worms), but only for a special "command" that controls the malicious program.
       Technical details 
     A malicious program that provides the user remote access to an infected machine. It is a Windows (PE-EXE file). Has a size of 221,184 bytes. It is written in C.
        Installation
     After starting the backdoor key looks in the following branches of the system registry:         
                      [HKLM\Software\Microsoft\Windows\CurrentVersion\Run] 
                      [HKCU\Software\Microsoft\Windows\CurrentVersion\Run] 
     In this backdoor attempt to overwrite the contents of the file, the path to which is specified as the values ​​enumerates key contents of your original file. In this case, to counter the anti-virus signature scanners in the copy modified 4 bytes:

Hackers have posted the source code on theNorton Antivirus

     Symantec has for several days been negotiating with the hackers to avoid getting source PCAnywhere and Norton Antivirus in the Network. According to the source, the hacker under the alias Yamatough, posing as one of the activists of Anonymous, require developers the amount of $ 50,000. Responsible for the talks was the alleged employee Symantec Sam Thomas (Sam Thomas), in another version - an FBI agent.     Early communication company agreed to comply with the hacker, but has put forward its own terms: "We'll pay you $ 50,000. But we must be sure that after the payment you publish the code. We will pay $ 2,500 per month for the first three months, starting next week. After this time you will have to convince us that the code is destroyed, and only then we will pay you the balance. We hope that the deal is fair. "     Symantec representative confirmed that, during the negotiations on the part of the hacker was the obvious extortion: "In January, a group of hackers calling themselves part of an international network of Anonymous, trying to get money from Symantec, in exchange for the public offering of the stolen code, which, according to their statement were available to criminals. The company conducted an internal investigation into the incident and contacted the police, report the facts of extortion and theft of intellectual property. Relationship with a person who was trying to get money from Symantec, was part of the FBI investigation. "

European Parliament voted against the ratification of anti-piracy agreement ACTA


     The European Parliament in Strasbourg voted against ratification of anti-piracy agreement ACTA toughens penalties for copyright infringement.     International agreement ACTA (The Anti-Counterfeiting Trade Agreement) provides for the establishment of the international association, which is a complex hierarchical system of enforcement of copyright in the developed countries. 
     In 2008, the European Commission, the U.S., Australia and the Government of a number of other countries have confirmed their participation in the preparation of ACTA, however, refused to publish the text of the preliminary contract and to discuss details.     
     October 5, 2011 ACTA signed the U.S., Australia, Canada, Japan, Morocco, New Zealand, Singapore and South Korea. January 6, 2012 to the Agreement of the European Union, but it has yet to be ratified by member countries. The European Commission, which is the highest executive authority of the EU, however, asked the supreme court to assess compliance of union agreements other obligations of the EU, in particular, the European Charter of Fundamental Rights. 
     Up to an opinion by the court ACTA ratification by the parliaments of the EU countries have signed it was suspended. That the agreement came into force in the EU, it should ratify the European Parliament and all States signatories. After this agreement was to give final approval to the EU Council.     Meanwhile, a number of member countries postponed the ratification of the agreement in the face of a wave of civil protests in the streets, as well as to the increasing cyber-attacks on websites of government agencies.     

Removal and treatment of computer viruses on your computer and laptop

     Hang, crash programs, incomprehensible excess traffic, other oddities in the computer or laptop say that most likely, it's infected by some kind of virus.
     If a computer virus does not prevent to live many people do not pay attention to him. And absolutely for nothing - many viruses are waiting for an opportunity to play a prank on the full program - the theft of accounts, with the removal of information and so on. And, suddenly, without any professional assistance is necessary.
     The specialists of our service center to clean your computer from viruses in Kiev at home. In addition, we install antivirus software and protects your system.
     We have all the right in such cases, a professional software - is antivirus software, special tools and anti-rootkits, but the important thing is that we have - it's a wealth of experience in the treatment and removal of all viruses in the administration systems of any complexity. With that we come to you and diagnose the status of the computer, let's deal with any problem.

What is a computer virus and who is the author?


     Computer virus - a malicious code or computer program. The virus also can perform arbitrary actions without the user, and the harm to the user or computer.
     Even if the creator of the virus did not program malicious action, the virus can lead to computer crashes due to errors. Viruses can occupy a certain place in the storage, hard drives and removable storage devices, selects some system resources. Therefore, the virus belongs to malware.
     Often, inexperienced users are subject to computer viruses other malware: spyware, etc. To date, thousands of known viruses, which are spread throughout the world via the Internet.
     Diffusion and creation of computer viruses, in Russia, is pursued by the Criminal Code. Under the doctrine of the information media in Russia are held legal scientists in ways in schools, colleges and universities for the Protection of computer information, combating destkoy information and computer viruses.
     Computer virus appeared, thanks to the idea of the American Programmer Bob Thomas, who at the end of the 70-xx's. devised a program data between two networked computers - "Slider". The program was developed for air traffic control and had to pass the current data on the status of an aircraft in the airspace between computers network connection.
     Thomas created a program to copy itself from one machine to another, and moved across the network, a message: "Catch me if you can! ". "Slider" moves between network nodes and entertained system administrators and users - so little program got its fame and history - continued.

     Bob Thomas has revived the idea of ​​the novel science fiction writer John Brunner. The basis of the work, which became a best seller, has laid down a modified history with the program "slider", with which the novel's hero fought against dictatorship and tyranny of the government. A similar program, "Worm", "travel" through a computer network, destroying the information.     With this novel, Hepp and Shock - employees of Xerox, which published the PC can be connected to a local network, decided to write a program like "worms" and named after the hero of the novel Brunner - "worm." By design, the program has a "worm" was a positive mission - moving from the network and check the network operating system PC for hidden defects and eliminating them.    However, it happened just the opposite - after the pilot run of the program, all of the company's computers were found in the morning, "hovering" state. This happened because of a minor error, which played a role in the uncontrolled proliferation of "worms" and block the work of the center. Happy Shock and had to sit down to work on a program-destroyer.     Thus began the emergence of an "era of computer viruses", which now have their wide distribution 

Which free antivirus is better to choose

     Today, no one doubts, than we need to use antivirus programs. The number of known viruses are millions and they're growing daily. Hackers gain  equals narco-traffickers income. Antivirus comparable to the cost of the armed forces of a small country and any reasonable person question whether you can save money on security, more precisely - how best protect your computer and its data, spending minimal money.
     Now, not a lot of the bad news. None of the most expensive and even with the latest updates can't protect you computer in 100%. Experience shows that most rarely cling viruses safe and considerate people to observe basic safety principles, which do not visit suspicious sites and do not download suspicious files. Some antivirus software can prevent users from doing this, but they are too paranoid and many sites will simply not open to you. Therefore, all the same, the best and most in control, but of course will need more and reliable assistants.
     If you use your computer for business purposes, in the office or in the shop, you'll need the licensed version of the antivirus. If your office has a lot of computers and a system administrators, I recommend the use of special, corporate version of antivirus software. On licensed and corporate antivirus software, I will write in other articles, and in this case I want to tell you about using free Antivirus Software.
     Free anti-virus, as I said, are for private (home) use. In this case, it is not reduced, limited-time version, and a full-fledged antivirus sufficient for most users. In its primary function - detection and removal of viruses, they are not inferior paid anti-virus in the same class. The main advantages are the absence of a paid version of the daily advertising and the availability of technical support during the installation of anti-virus protection and removal of viruses. Again, paid antivirus programs have extended functionality that might be useful to you.

Installed a second antivirus and computer hung?

     It so happened that you are inexperienced installed on your computer two antivirus and now your Computer literacy freezes, you can not start the program and remove one of the antivirus software also does not work? In this case, proceed as follows:
  1. Starting up in Safe Mode (press F8 before loading Windows, wait until the boot menu appears, select Safe Mode)
  2. At this stage, you can try to remove one of the antivirus programs through Add or Remove Programs in Control Panel and in this case will be finished, and you can restart the computer in normal mode. But not all anti-virus software can remove so that as many of them installed and removed using packages msi, work with that in safe mode is not supported by Windows. In this case, proceed to the next step.

About antivirus software and how do they work

     Today, in the digital era, the most topical problem is information and system protection. For many, it is no stranger to the fact that computer technology makes it possible for a malicious file to someone else's private life information, Manage other people's computer, and Steal info or even money, so the question naturally arises - how to protect yourself?

     In his defense may be different, this is just a means to turn off the computer, disconnect internet  and check every suspicious file, but today it is the most popular to use antivirus software.

     This article is to understand what is and what types of viruses are divided into the computer, which antivirus is better in the given situation and the rules how to protect our computer - to minimize the risks.