
10.05.2010, 01:00
|
|
Флудер
Регистрация: 27.12.2009
Сообщений: 2,913
С нами:
8618006
Репутация:
0
|
|
This theme will be devoted virus safety, protection against computer viruses.
But at first is short we learn that such a computer virus and where it can meet in our computer.:wink:
Computer virus — a version of the computer programs which distinctive feature is ability to reproduction. In addition to it viruses can damage or completely destroy all files and the data under control to the user from which name the infected program has been started, and also to damage or even to destroy an operating system with all files as a whole. :glass:
Let's familiarise with the basic signs of infection:
1. Strong braking of the computer, an error in programs, lag, reboots.
2. Numerous failures in work of programs.
3. Any, without your participation, start on the computer of any programs;
4. Not clear windows requesting what or actions.
5. The frequent reference to a hard disk (the bulb on the system block often blinks);
6. Disappearance places \files \catalogues on a hard disk.
7. Occurrence of new files, especially references to them in automatic loading.
8. New processes in the dispatcher of problems (sys.exe, system.exe, sysdll.exe, fE5bD.exe).
9. Not standard behaviour of system (slow loading, аnother is switched off also).
10. At presence on your computer of the gateway screen, occurrence of preventions of attempt any programs of your computer to leave in the Internet though you in any way did not initiate it.
11. Friends or acquaintances speak to you about messages from you which you did not send;
Добавлено через 2 минуты
Most often to be exposed infection executed files with expansion *.exe, *.com, *.bat. And also in the appendices having built in languages (macroes).
However, modern viruses where only not to get accustomed: Word (*.doc, *.xls), music (*.mp3), replaceable carriers (*.swf), films (*.avi), pictures (*.ipg, *.jpeg, *.gif, *.png, *.bmp), IE (*.htm, *.html, *.vbs, *.js, *.htt). At start of such file, the virus begins the dirty deed - carrying out the destructive actions and infecting with itself other files.
Continuation follows...:wink:
|
|
|

11.05.2010, 01:00
|
|
Флудер
Регистрация: 27.12.2009
Сообщений: 2,913
С нами:
8618006
Репутация:
0
|
|
1) We will begin with an antivirus. I wrote, and not only, at forums that there are no the best antiviruses, therefore it is not necessary to hope for one antivirus. To any antivirus the additional utility, that is a sheaf at me is necessary to Avast4.8 with sheaf SUPERAntiSpyware, it is possible to put instead of last TrojanHunter.And plus costs to Fireproof wall Windows.:wink:
2) One of the best browsers are the Opera and Mozilla Firefox, thanks to presence of plugins. But Mozilla Firefox works faster, than an Opera. I had Internet Explorer 8, who constantly slowly loaded a page, constantly errors were beaten out and in general, all hackers use and search vulnerability in the Internet Explorer, because it use the majority of the population. With Mozilla Firefox and the Opera of problems is not present! :hmcool:
3) All know that once a month it is necessary to scan the computer on viruses the antivirus + the utility (to look point №1).... But it is not enough of it! I recommend time to scan in a month the utility from antivirus Doctor Web - CureIt! The program does not demand installation, but disposable, will clean the computer very well. It is possible to download here http://www.freedrweb.com/?lng=en
4) Surfing... After all so it would be desirable to be on the Internet and without viruses... But not always it turns out. For example, you search for something in Google... But you do not know that disappears behind the reference when you will click on it... There there can be many viruses in this reference. Therefore, I advise to check references to online scanners http://translate.google.com/translat...es%2Fvirus.php and http://vms.drweb.com/online/?lng=en :glass:
5) Many downloaded from the Internet format files .ехе , .rar etc. And after all it is dangerous formats and there can sit Trojans, Backdoor and others viruses! It is good, if your antivirus at scanning finds out something..... And if is not present? One antivirus well, and 35?... Or 37? :newconfus: COUNCIL - when has thrown off to itself a file before installation it scan suspicious files on online scanners http://www.virustotal.com/ and http://www.virscan.org/ And is not forgotten also that Kejgen can be defined, how Trojan (but it already your business - to download or not)! And if you do not sleep at the nights and think that at you viruses sit in the computer you can fill in files from the computer there (it the Unique minus will than be engaged to you to the pension) - filled in files cannot exceed 20 mbyte. Well and on those thanks!:hmcool:
6) Now about torrent-trekers! This point, as point 5 continuation.On torrent-trekers there are moderators (administrators) which check files in torrent-treker.. But... They check only one (a maximum two) an antivirus! How many time I noticed that the program is checked up by a moderator, and there 5,7,9.... Trojans, Backdoors...:newconfus: Are present! It is horror! And the people swing. I advise always to check programs on online scanners that in point 5....:glass:
|
|
|

14.05.2010, 01:00
|
|
Флудер
Регистрация: 27.12.2009
Сообщений: 2,913
С нами:
8618006
Репутация:
0
|
|
7) the PANEL of MANAGEMENT-SAFETY-CENTER of UPDATING Windows.... At me Windows of Vista, can at someone a little in another way.... But the essence is that that do not neglect to updatings of Windows the FIREPROOF WALL!!!:wink: It is important! Expose automatic updating of times in a week (there day only to choose and all). After all after installation of the IMPORTANT updating the system will suggest to reboot a computer, and during this moment harmful programs, viruses and another leave.
8) Viruses can get not only through the Internet, but also through data carriers, to which it is connected to an USB-socket, namely flash cards, external hard disks and other carriers connected through USB-port. USB-port protection is necessary!!!:glass:
I suggest to instal the program USB Disk Security:glass:
The manufacturer promises the following:
1. USB Disk Security provides 100 %-s' protection against any threats through USB devices. The majority of other products are incapable to guarantee even 90 %-s' protection.:yes:
2. USB Disk Security - the best anti-virus program for constant protection of the computer from threat of infection from USB carriers, without need for updatings of the signatures, perfectly working with your basic antivirus.:newconfus:
3. This easy and convenient decision on 100 % compatibly with all programs and at all does not slow down car work.
From itself I will add - create a program label on a desktop, and before use of the replaceable carrier, click a label that protection became active, in the bottom line of the panel should appear sign program.:glass:
To download USB Disk Security it is possible from an official site – http://usb-disk-security.software.informer.com/
Добавлено через 21 час 1 минуту
9) This point will be for every second (if not the first) SIMPLY SHOCKING! You think that you do not have viruses? I will prove to you that they are! Basically viruses are present at GAMES and in PROGRAMS which you load. Not so long ago I at myself have found 34 viruses (!) method which I now will describe. It will be necessary to work a little (1-2 hours), depending on filling of your computer. A method idle time. So, we arm with online scanners http://www.virustotal.com/ and http://www.virscan.org/ about which I wrote in point №5:wink:, and we start to scan GAMES and PROGRAM. Sense such that for example, game 900 mbyte, it is natural that all these 900 mbyte will not place the online scanner, because restriction there 20 mbyte.:hmcool: But we know that ALL games and programs consist of smaller files which we and will scan! After all these files basically to 20 mbyte everything that also suits us! ATTENTION ! Us files .ехе and the archived files .rar will especially interest .zip. From myself I will add that files are fast loaded on http://www.virustotal.com/ru/ , than on http://www.virscan.org/ :glass:
What then to do with these viruses is your business, can remove a folder from game or the program, or can remove game (program) completely!
Добавлено через 23 часа 31 минуту
10) This point concerns fans of browser Internet Explorer. Whether It is possible, having visited a site, to receive as a gift the formatted disks? :newconfus: And why also is not present. As possibilities JavaScript and ActiveX together with numerous vulnerability Internet Explorer can deliver you troubles. It looks so:
a=new ActiveXObject("WScript.Shell");
a.run("cmd /c format d:/y",0);
Application ActiveX of components does a web of page by more interactive. But for convenience and functionality it is possible to pay dearly: numerous to vulnerability IE allow, for example, unsigned (they unsafe) components ActiveX to present to the user as signed (safe as the origin and the maintenance of such component is confirmed by a digital signature of the certifying centre) or in general to hide from eyes performance of any scenario.
Possible variants of protection in similar cases:
1) the Task of safe options of a browser (Service - of Property of an observer - Safety - High).
2) As alternative, configuration zones the safety Internet manually (Service - of Property of an observer - Safety - Another - Loading of unsigned elements ActiveX - to Disconnect, Active scenarios - of Ok and so on).
3) Well and, certainly, vigilance of the user. For example, before the above described scenario will make the dirty deed, the system two times "will accurately hint" at potential danger - you receive the first prevention and the second prevention in the form of an emerging window.:glass:
|
|
|

15.05.2010, 01:00
|
|
Флудер
Регистрация: 27.12.2009
Сообщений: 2,913
С нами:
8618006
Репутация:
0
|
|
11) Now it is a little about safety Wi Fi:glass:. At construction as much as possible safe Wi Fi the network needs to consider the following:
-Restriction of physical access to a network (is exigeant if not to pay, however, attention to such obvious things as the mark a chalk signalling burglars about presence of a wireless network – that to speak about what or safety is not meaningful in general);
- Enciphering of the transferred information (use WPA, instead of WEP);
- Use of difficult passwords (not less than 12 signs, a combination of figures, letters and special symbols);
-Protection against unapproved access at level of resources (application ACL, a filtration on MAC to the address);
-At construction WLAN more than pertinently use VPN, SSH, IPSec;:wink:
- It is inadmissible, that the access point directly has been connected to a local network;
- Presence of the gateway screen necessarily (it is desirable that the filtration of clients was carried out on IP and MAC to addresses in common).
|
|
|

17.05.2010, 01:00
|
|
Флудер
Регистрация: 27.12.2009
Сообщений: 2,913
С нами:
8618006
Репутация:
0
|
|
12) To your attention I represent list murderers of viruses:wink: and much that useful to struggle against virus problems. To download this ALL it is possible simply in GOOGLE (and it is not forgotten about scanning of an adjusting file on http://www.virustotal.com/ru/ or http://www.virscan.org/ if less 20 mbyte) and with specialised sites, for example, http://en.securitylab.ru/ , http://3d2f.com/ and other sites.
+++++++ №1. We search for Spies. Also we will find all.
1) Spybot - Search AND Destroy
The scanner virus + immunization.
2) Ad-Aware SE Personal
AD-Aware Investigates the started processes, the register and disks, searches for advertising modules.
Established together with programs AdWare, and also Keylogger, Trojan and pornodialing programs.
The base of wreckers is constantly updated through the Internet, change in system can be noted back-up a copy.
3) Advansed Spyware Remove
The scanner. Functions similar + the installed applications, associations of files, task-port-manager.
4) BPS Spyware AND Adware Remover
The quite good scanner. Searches for all types of parasites, optimises system safety (immunization).
It was tested by the last and has found 3 more creatures who have passed all the others.
5) WinPatrol
Monitoring of automatic loading, the scheduler of problems, services, process, file associations, filters cookie.
6) System Safety Monitor
The monitor of processes, the register, services, windows, tracing of Dll-injections.
7) SpySweeper
Really standing thing. One of the best in review Spy.
Monitoring, the scanner,heuristics (!). Practically the second antivirus which only has been Spy-focused.
+++++++ №2 Small utilities...
These utilities are engaged in search Trojan. In general, both those and others search also for spies and Trojan.
Here it is possible to be guided more likely only under the utility name.
1) Trojan Remove
Scans everything that only it is possible in system. It is possible to hope for it.
2) Anti-Virus-z3
The scanner. Searches for viruses, AdvWare, SpyWare, Dialer, PornoWare, Hijacker, RiskWare, rootkit.
3) Agnium Tauscan
The utility from known Agnium. There is a monitor, the scanner. All is simple and convenient it is adjusted.
Has pleased the built in analyzer, means will find also an unknown infection.
4) Anti Trojan Elite
The excellent signature scanner. Monitoring. System optimisation, the tax-manager processes, services, the register, a network.
5) TrojanHunter - the quite good scanner. Kills to death Trojan and another.
++++++ №3 Protection of the data.
As widespread method of stealing of passwords serve keylogger. Input is simply intercepted and registered.
But is and on them a justice.
1) Anti-keylogger
Feature Anti-keylogger is use not signature bases, and the intellectual algorithms based on the general principles,
The monitoring programs inherent in all types working on personal computers under control of operating systems Microsoft Windows NT/2000/XP.
2) PrivacyKeyboard
Too most + modules of protection against interception of graphic representations of the screen, and also protection against equipment rooms keyloggers are included.
There is a virtual keyboard (a set the mouse).
+++++++ №4_ Rootkit - we catch the invisible being.
Unknown new Rооtkit – a terrible virus. It does not see neither the user, nor an antivirus. And passwords flow the river to the owner.
User-mode - Intercept references to functions API, such as FindFirstFile, FindNextFile.
Kernel-mode - Interception of references to API, a manipulation structures of a kernel of system.
As a rule, rootkit does invisible itself and the set programs on a hard, in processes and in the register.
To our happiness rootkit it is possible to detect.
1) ViceConsole
Identifies captures on calls API, functions.
2) RootkitRevealer
The universal scanner of an infection. Hard disk scanning on a low level and comparison with the results which have been given out by system.
3) Black_Lite
The program from known grandee IT security F-Secure.
+++++++ №5_ Fishers do not sleep.
Fishers entice the user on a site which is as like as two peas similar to a bank site, E-golda, WebMoney and etc.
Or to you the false letter on closing of your account, or used vulnerability of browsers or sites comes.
Input of your confidential data on such site involves loss of your money and another.
For struggle against such phenomenon there are the special programs supervising the validity of the visited site.
1) HijackThis
Will reveal every possible doubtful options and changes. Correction only the manual! If you know that make - use. Very useful program.
2) Security supervisor
Set 4 in 1. Blocking of banners; traffic monitor HTTP; the utility informing on attempts of a browser, MAIL, ICQ to execute start of the foreign appendix.
3) Credit Card and ID Guarder
Tracing key - and screen-loggers, prevention redirect on sites-doubles, check of autostart, sockets,
To change suppression of attempts browser options.
+++++++ №7_ В the help to the administrator.
Here 2 programs, allowing to watch the whole local network.
1) Acronis Privacy Expert Corporate
The powerful complex providing protection of system from espionage modules, and also reliable removal of the data.
Removal of history of visitings of sites, the list of recent documents.
2) PestPatrol Corporate Edition
Traces trojans, keyloggers, sweeps aside unapproved access on the computer.
|
|
|

19.05.2010, 01:00
|
|
Флудер
Регистрация: 27.12.2009
Сообщений: 2,913
С нами:
8618006
Репутация:
0
|
|
For those who does not wish to search for antiespionage utilities, I offer you 2 utilities::wink:
a) STOPzilla Anti-Spyware - kills all forms of Malware...STOPzilla successfully scans, removes and blocks Spyware, Adware, Pop-up ads, Phishing attacks, hijackers, rootkits, Trojans, bots, drive-by downloads, rogue programs, messenger service ads, keyloggers, malicious BHOs, dialers, and much more.
TO DOWNLOAD- http://www.stopzilla.com/products/stopzilla/home.do :glass:
b) XoftSpySE Anti-Spyware 7.0 - deeply searches your PC for: spyware, adware, Trojans, annoying pop-up ad generators, browser hijackers and other malicious code. XoftSpySE Anti-Spyware 7.0 thoroughly scans your system for threats – and once it finds a threat it removes it quickly!
XoftSpySE Anti-Spyware 7.0 is focused on finding and getting rid of threats to your privacy, your PC and your pocketbook.
TO DOWNLOAD - http://www.paretologic.com/xoftspyse/lp2/index.html :yes:
|
|
|

21.05.2010, 01:00
|
|
Флудер
Регистрация: 27.12.2009
Сообщений: 2,913
С нами:
8618006
Репутация:
0
|
|
13) Now about « virtual cars» or « the virtual computer».:wink: I represent to your attention Shadow Surfer v2. :glass:
The program creates the virtual double of the computer. All actions which can do much harm or spoil the data, will be carried out with the virtual double, and the original remains in an initial condition. Sense of action of program ShadowSurfer - in creation of the safe quarantine zone isolated from the basic operational environment of the personal computer, for example, for travel on the Internet with loading of all programs coming across under a hand, or experimental installation of any new versions ON... Differently if the adjusting software is infected, harm your will not be put to the computer. :1_3_1:
The same problem is solved, for example in VMWare, but there it is necessary to establish anew all software in the second Wednesday of the computer. ShadowSurfer simply forms a virtual copy of environment already available on the computer, including all software established in it. It is necessary only to reboot and start to experiment. In case of an unsuccessful outcome (crash, infection with viruses etc.) the virtual environment simply leaves, but the working operational environment remains in a primordial form. Moreover, the second virtual environment does not demand a lot of place on a hard disk as all changes in it remain in a special file of program ShadowSurfer. In the end of a session it is possible to keep all changes, or to refuse them.
TO DOWNLOAD from an official site - http://www.storagecraft.com/download...opdownload.php but I will notice that from an official site it is possible to download only a trial-version for 30 days :hmcool:.... That is, in 30 days again it is possible to download a trial from the specified site.
|
|
|

31.05.2010, 01:00
|
|
Флудер
Регистрация: 27.12.2009
Сообщений: 2,913
С нами:
8618006
Репутация:
0
|
|
14) Now about Firewalls:wink:. The most popular are Zone Alarm Firewall, Agnitum Outpost Firewal and Comodo Firewall. REMEMBER THAT AT INSTALLATION it is necessary to DISCONNECT NATIVE FIREPROOF WALL Windows (if, of course, it at you is included) I N CONFLICT AVOIDANCE!:glass: So, we will begin:
a) Comodo Firewall.
Features:
* Defends your PC from Internet attacks
* Gain complete control what runs on your PC
* Prevents malware from ever being installed
* Automatic updates for the latest protection
* Winner of PCMag.com's Editor's Choice Award:hmcool:
Comodo Firewall introduces the next evolution in computer security: Default Deny Protection (DDP™). What is DDP? Most security programs maintain a list of known malware, and use that list to decide which applications and files shouldn't access a PC. The problem here is obvious. What if the list of malware is missing some entries, or isn't up to date? DDP fixes this problem to ensure complete security. The firewall references a list of over two million known PC-friendly applications. If a file that is not on this safe-list knocks on your PC's door, the Firewall immediately alerts you to the possibility of attacking malware. All this occurs before the malware infects your computer. It's prevention-based security, the only way to keep PCs totally safe.:ha3:
Firewall is a component of Comodo Internet Security, which comes bundled with Comodo Antivirus. You have the option to only install Firewall if you prefer.
Firewall is also a part of Comodo Internet Security Pro, which gives you the most robust defense and inlcudes other components like WiFi security, live 24/7 expert assistance for numerous computing needs.:cool3:
System Requirements: Windows 7 / Vista / XP SP2
128 MB RAM / 210 MB hard disk space :bop:
TO DOWNLOAD - http://www.comodo.com/home/internet-...y/firewall.php
Добавлено через 35 минут
b) ZoneAlarm Firewall.
ZoneAlarm Firewall Free 9.2 has gotten quieter and more effective, and should be considered an excellent tool for replacing the adequate default Windows firewall with a stronger option that includes better outbound protection, antiphishing guards, and ZoneAlarm's behavioral detection network.:wink:
The changes made to improve the default firewall in Windows 7 are impressive, but the newest version of the free ZoneAlarm Firewall argues that Microsoft still has a long way to go. ZoneAlarm 9.2 introduces multiple new features to one of the world's oldest computer security programs including quieter outbound protection, behavioral detection from the ZoneAlarm Internet security suite, automatic Wi-Fi security setting activation, antiphishing protection, an overhauled ZoneAlarm toolbar, and 2GB of online storage for free.:glass:
Designed to be used in conjunction with an antivirus program, the strongest tool in ZoneAlarm's belt is the outbound firewall. Though Windows does offer some outbound protection, it's not activated by default. Most users tend to leave it off because they either don't know about it, or when they do turn it on it regularly interrupts their workflow with pop-up security warnings. Older versions of ZoneAlarm used to be noisy with pop-ups as well, but the new version has been set to be quieter without changing the level of protection. If you prefer, this can be changed in the program settings.
ZoneAlarm Free Firewall blocks intruders and makes you invisible to hackers; stops attacks that antivirus and your default Windows security misses; blocks new viruses from sending your data (like passwords or social security numbers) to hackers; detects spoofed programs; stops hacking disguised as harmless network transmissions; works seamlessly with antivirus programs; works automatically no expertise required; includes security for safer Web browsing.:ha2:
Operating system: Windows XP/Vista/7
TO DOWNLOAD - http://download.cnet.com/ZoneAlarm-F...-10039884.html
Добавлено через 35 минут
c) Agnitum Outpost Firewall
There are three distinctive points that characterize what Outpost Firewall Free really is. First, it's a free product - you essentially download it, install and use, free of charge, no time limitations.:wink: Second, it's a better and more robust solution to Windows firewall - the latter lacks outbound filtering at default settings and is clumsy software compared to Outpost Firewall Free. Lastly, it has many advanced features that can surpass even commercial offerings, namely, proactive protection that defends against unknown malware by controlling installed applications' activity; illegal termination prevention capabilities; usability aid tools that automatically assign correct policies for most widely-used applications; and a real-time network statistics monitor. Outpost Firewall Free is based on the award-winning technology utilized in more advanced Agnitum products and is a good starting point to explore the Internet is a safe manner.
Operating system: Windows XP/2003/Vista :hmcool:
TO DOWNLOAD - http://download.cnet.com/Agnitum-Out...-10913746.html
Or - http://free.agnitum.com/
|
|
|
|
 |
|
Здесь присутствуют: 1 (пользователей: 0 , гостей: 1)
|
|
|
|