Expert Virus Removal Services and Technical advice.

We are Providing Computer users with Expert Virus Removal Services and Technical Advice.

Threats and their Removal.

Do you need a quick solution to a technical problem? With our live remote-assistance tool, a member of our support team can view your desktop and share control of your mouse and keyboard to get you on your way to a solution.

Spywares and their Removal.

Are you worried that your computer might be nfected with Spywares? Then this is were you can find Support.

Advices for Protecting the Computer.

Expert Advices for Protecting your computer from attacks from all threats

Different Anti Virus Software and Tools.

Familiarizing different Anti Virus Software and removal Tools.

February 1, 2011

Enable Windows Task Manager-Disabled by a Virus



How to Enable Windows Task Manager When Disabled by a Virus

 


Even if you have anti-virus installed, you can still be infected by a new or custom virus that is not recognized by your anti-virus. Sometimes after removing the virus completely from your system, you’ll face new problems such as you can no longer bring up Windows Task Manager from CTRL+ALT+DEL. You get the error message saying “Task Manager has been disabled by your administrator”. This post will help you to re-enable the Windows Task Manager if it cannot be opened normally. Just follow these steps. 





Teqila Botnet

A new type of attack included a name of a girl that will steal banking or financial information.It comes in many ways by clicking on a website that contains the information about the four-year-old girl, Paulette Gebara Farah, who was later found dead in her own bedroom, through messenger, via USB devices.

Rootkit With Ubuntu



Rootkit viruses are designed to be impossible to detect by users and antivirus software. These viruses burrow themselves deep underneath standard computer processes, often residing below the operating system function within the system BIOS, operating system kernel or within little-used libraries. By doing this, rootkit infections can be difficult to remove using standard software and in some cases, the rootkit application can escape antivirus and anti-spyware removal by injecting itself into other levels of the operating system.

Removal Of WORM_STRATION.FA

As this comes in the form of an attachment it is easy to identify. All we have to do is to scan the attachment with a good anti-virus product. However the manual removal involves the following things when PC is already infected.

January 31, 2011

WORM_STRATION.FA

It is another email virus that comes as an attachment. This worm propagates by attaching copies of itself to email messages that it sends to target addresses gathered from the Windows Address Book. It is capable of sending email messages without using mailing applications, such as Microsoft Outlook. Its main payloads are dropping and downloading malicious file.

SASFIS

It arrives via a spammed message with a .RAR file attachment. Extracting the compressed file reveals what appears to be an .XLS file. This Trojan drops a file detected as BKDR_SASFIS.AC, which allows threads to be injected to the normal svchost.exe process.

January 29, 2011

Email Spoofing


E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.

Related Posts Plugin for WordPress, Blogger...

Search This Blog

Followers

Categories

Twitter Delicious Facebook Digg Stumbleupon Favorites More