Показать сообщение отдельно

  #5  
Старый 17.05.2010, 01:00
alexfedoruk
Флудер
Регистрация: 27.12.2009
Сообщений: 2,913
С нами: 8618006

Репутация: 0


По умолчанию

12) To your attention I represent list murderers of viruses:wink: and much that useful to struggle against virus problems. To download this ALL it is possible simply in GOOGLE (and it is not forgotten about scanning of an adjusting file on http://www.virustotal.com/ru/ or http://www.virscan.org/ if less 20 mbyte) and with specialised sites, for example, http://en.securitylab.ru/ , http://3d2f.com/ and other sites.

+++++++ №1. We search for Spies. Also we will find all.

1) Spybot - Search AND Destroy
The scanner virus + immunization.

2) Ad-Aware SE Personal
AD-Aware Investigates the started processes, the register and disks, searches for advertising modules.
Established together with programs AdWare, and also Keylogger, Trojan and pornodialing programs.
The base of wreckers is constantly updated through the Internet, change in system can be noted back-up a copy.

3) Advansed Spyware Remove
The scanner. Functions similar + the installed applications, associations of files, task-port-manager.

4) BPS Spyware AND Adware Remover
The quite good scanner. Searches for all types of parasites, optimises system safety (immunization).
It was tested by the last and has found 3 more creatures who have passed all the others.

5) WinPatrol
Monitoring of automatic loading, the scheduler of problems, services, process, file associations, filters cookie.

6) System Safety Monitor
The monitor of processes, the register, services, windows, tracing of Dll-injections.

7) SpySweeper
Really standing thing. One of the best in review Spy.
Monitoring, the scanner,heuristics (!). Practically the second antivirus which only has been Spy-focused.

+++++++ №2 Small utilities...

These utilities are engaged in search Trojan. In general, both those and others search also for spies and Trojan.
Here it is possible to be guided more likely only under the utility name.

1) Trojan Remove
Scans everything that only it is possible in system. It is possible to hope for it.

2) Anti-Virus-z3
The scanner. Searches for viruses, AdvWare, SpyWare, Dialer, PornoWare, Hijacker, RiskWare, rootkit.

3) Agnium Tauscan
The utility from known Agnium. There is a monitor, the scanner. All is simple and convenient it is adjusted.
Has pleased the built in analyzer, means will find also an unknown infection.

4) Anti Trojan Elite
The excellent signature scanner. Monitoring. System optimisation, the tax-manager processes, services, the register, a network.

5) TrojanHunter - the quite good scanner. Kills to death Trojan and another.


++++++ №3
Protection of the data.

As widespread method of stealing of passwords serve keylogger. Input is simply intercepted and registered.
But is and on them a justice.

1) Anti-keylogger
Feature Anti-keylogger is use not signature bases, and the intellectual algorithms based on the general principles,
The monitoring programs inherent in all types working on personal computers under control of operating systems Microsoft Windows NT/2000/XP.

2) PrivacyKeyboard
Too most + modules of protection against interception of graphic representations of the screen, and also protection against equipment rooms keyloggers are included.
There is a virtual keyboard (a set the mouse).

+++++++ №4_Rootkit - we catch the invisible being.

Unknown new Rооtkit – a terrible virus. It does not see neither the user, nor an antivirus. And passwords flow the river to the owner.
User-mode - Intercept references to functions API, such as FindFirstFile, FindNextFile.
Kernel-mode - Interception of references to API, a manipulation structures of a kernel of system.
As a rule, rootkit does invisible itself and the set programs on a hard, in processes and in the register.
To our happiness rootkit it is possible to detect.

1) ViceConsole
Identifies captures on calls API, functions.

2) RootkitRevealer
The universal scanner of an infection. Hard disk scanning on a low level and comparison with the results which have been given out by system.

3) Black_Lite
The program from known grandee IT security F-Secure.

+++++++ №5_ Fishers do not sleep.

Fishers entice the user on a site which is as like as two peas similar to a bank site, E-golda, WebMoney and etc.
Or to you the false letter on closing of your account, or used vulnerability of browsers or sites comes.
Input of your confidential data on such site involves loss of your money and another.

For struggle against such phenomenon there are the special programs supervising the validity of the visited site.

1) HijackThis
Will reveal every possible doubtful options and changes. Correction only the manual! If you know that make - use. Very useful program.

2) Security supervisor
Set 4 in 1. Blocking of banners; traffic monitor HTTP; the utility informing on attempts of a browser, MAIL, ICQ to execute start of the foreign appendix.

3)Credit Card and ID Guarder
Tracing key - and screen-loggers, prevention redirect on sites-doubles, check of autostart, sockets,
To change suppression of attempts browser options.

+++++++ №7_В the help to the administrator.

Here 2 programs, allowing to watch the whole local network.

1) Acronis Privacy Expert Corporate
The powerful complex providing protection of system from espionage modules, and also reliable removal of the data.
Removal of history of visitings of sites, the list of recent documents.

2) PestPatrol Corporate Edition
Traces trojans, keyloggers, sweeps aside unapproved access on the computer.
 
Ответить с цитированием