Blog Archives

How to prevent from Phishing Web page using Domain name?

Viewing SSL certificate:

  •  Always check the url whether it is secure connection or not.  “https://” means secure connection.  “http://” means usual connection. 
  •   Use Secure connection.
  •  You should check the SSL certificate. How to check the certificate. visit the website. You can see the website favicon icon in browser in address bar. click the favicon icon.
  • It will show small box
  • Click the More information.
  • Now the small modaless window will be opened.
  • You can see “view certificates”. Click it and verify whether it is original or not.
  • If you are not able to find the “view certificates” ,then you visit wrong website or you are in non-secure connection.
  • Note some website doesn’t have the SSL certificate, so we can’t access the website using secure connection(i mean https://).
  • use gmail using secure connection, i means using https://gmail.com

Another Way:
Know what is the IP address of your domain.
Open the notepad enter your domain name and ip address as like this:
Domain name         xxx.xxx.xxx.xxx
Then save the file.
Whenever you want to visit the site, open the file and copy the IP address of domain name.
Paste the IP address into browser and hit enter.
If you do like this, you can visit the site directly.
Actually domain name connects to associated ip address but we are directly using IP address. So we won’t redirected to any other phishing web page.
It might look bore to do.
But if you did this ,you can prevent your account lost.

Top Five Tips To Keep Your Computer Secure

If your house was like your computer, it wouldn’t come with locks and you could be burgled from thousands of miles away. Obviously, you’d secure your castle before moving in – so why don’t we do the same for computers? Here are our top five computer security tips that’ll help keep the invaders out.

Passwords

Most people know the password to Ali Baba’s cave was, “Open Sesame”, but such predictability is also true with computer users. “123456″ is the most used password, while “12345″, “123456789″, “Password”, “iloveyou”, “princess” and “rockyou” are all in the top-ten. Pick something unique!

It’s also good practice to use different passwords for different websites. This is because if your password is stolen from one website, the hacker might try to use it to access your accounts elsewhere.

Updates

Everyone hates updates – they’re intrusive, irritating and almost constant. Aside from annoying us, however, they’re vital to fix potential security holes.

Your web browser, Windows, OSX, Java and Flash are the most-targeted culprits, so make sure you always accept these updates as soon as they are available. I know, it’s annoying, so here’s a message to developers: stop making us restart our computer to apply an update – we’ll be more likely to do it!

Also, make sure your antivirus software is up-to-date. That includes if your free trial has run-out. No virus protection at all? Shame on you! Norman provides a comprehensive security package (Norman Security Suite PRO), but even if you’re with someone else, remember to update!

WEP Wifi

If you’ve bought a new router in the last three years, feel free to ignore this section. Otherwise, you should check the security settings on your wifi.  Hopefully, you’ll be on WPA or WPA2 – these are up-to-date security formats and you’ll be okay (although WPA2 is much better than WPA).

If it says WEP, however, it’s time to upgrade. WEP is an ancient technology that can be hacked in around 30 seconds. Oh dear. You might be able to change to WPA on the router, but most likely we’re talking about a trip to the shops.

Internet Cafes and Public Wifi

Some people need caffeine to help them through the day, others need the internet. Luckily, internet cafes provide both. Unluckily, each time you log-in to one with your own computer, you’re putting it on a strange network that’s accessible by people you don’t know.

Your non-HTTPS data is particularly at risk from snooping, which means people could read your Facebook communications. For Facebook, you can add HTTPS in your account settings, but other traffic may be less secure. Remember: don’t bank in public.

Backups

Should the worst happen, backups are the only way of getting your computer back to exactly how it was. You can do this useful by transferring files onto an external harddrive, or use an off-the-shelf solution like Norman’s (Norman Online Backup) to do all the fiddly-bits for you.

The (somewhat dramatic, I admit) question I ask is – if your house burnt down, and you could restore it with a couple of mouseclicks – would you do it?

 | DIGITAL LIFE • http://www.cubesquare.co.cc

How can you Configure AVG Anti-Virus with your Router?


avg-support
H
ave you installed AVG Antivirus in your system? Whether you avail the business version or the home version, you will get firewall protection from it. No intruder can access your PC due to this protection. In spite offering your protection against the hackers, firewall can create certain problems in case you are using router for the home network.

In this case, proper configuration of AVG Anti-Virus software is necessary when router is used to setup the home network. For any such configuration and other services, you can subscribe to the technical support monthly packages to enjoy smooth computing. Any issue with your router, modem and computer will be readily solved.

Step 1 : Right clicking the icon of AVG, choose Open AVG User Interface > click on Components > select Firewall.
Step 2 : Next, click on Configure > choose Create a new configuration, in case you have not run the wizard of configuration. Then select Update Current Settings when you have already run AVG wizard.
Step 3 : When you have connected your computer only to your router, you have to select the option for one computer. However, if multiple computers are connected to the same router, you have to select the network option.
Step 4 : Again, when you are suing wireless router, the selection will be different. The remote technical support professionals are the best guides to help you with the selection process.
Step 5 : Click on Next > Complete Scan > Next for total scanning.
Step 6 : Lastly click on Next and make the choice of the domain according to the computing device you have connected to.

How to Remove Antivirus 2009 Virus

Antivirus 2009 is known to be fake anti-spyware software that is mistakenly installed by visiting a misleading site that tries to convince you that your computer is infected. Upon installation, Antivirus 2009 claims to scan your PC, resulting in a list of fake infections that can only be removed from your computer once you purchase the software. Moreover, once Antivirus 2009 is on your system, it can hijack your browser by installing a browser helper object that displays fake messages via Internet Explorer.

Fake Antivirus 2009 Messages vary from a fake Google Tips area displayed when visiting the Google homepage saying that “Google recommends you activate Antivirus 2009“, to a simple line of text toward the top of your browser telling you that an infection was found.

How to Remove Antivirus 2009 (Automatically):

  1. Download and install Malwarebytes Anti-Malware software
  2. Launch the software performing a simple scan to detect and then remove the fake Antivirus 2009

Note: Although the Malwarebytes tool will remove this threat for Free, if your existing Antivirus solution let the threat through, I highly recommend Purchasing the Pro version of Malwarebytes Anti-Malware for live protection and future malware threat prevention.

Removing Antivirus 2009 (Manually):

  1. Press Ctrl + Alt + Del then find and End the following processes:
    • av2009.exe
    • AV2009Install.exe
    • Antivirus2009.exe
  2. Delete the following files from your PC:
    • %UserProfile%DesktopAntivirus 2009.lnk
    • %UserProfile%Application DataMicrosoftInternet ExplorerQuick LaunchAntivirus 2009.lnk
    • %UserProfile%Local SettingsTemporary Internet FilesContent.IE5S96PZM7Vwinsrc[1].dll
    • %UserProfile%Start MenuAntivirus 2009
    • %UserProfile%Start MenuAntivirus 2009Antivirus 2009.lnk
    • %UserProfile%Start MenuAntivirus 2009Uninstall Antivirus 2009.lnk
    • c:Program FilesAntivirus 2009
    • c:Program FilesAntivirus 2009av2009.exe
    • c:WINDOWSsystem32ieupdates.exe
    • c:WINDOWSsystem32scui.cpl
    • c:WINDOWSsystem32winsrc.dll
  3. Click Start > Run, type regedit, Find and delete the following registry entries:
    • HKEY_CURRENT_USERSoftware
      75319611769193918898704537500611
    • HKEY_CLASSES_ROOTCLSID
      {037C7B8A-151A-49E6-BAED-CC05FCB50328}
    • HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows
      CurrentVersionExplorerBrowser Helper Objects
      {037C7B8A-151A-49E6-BAED-CC05FCB50328}
    • HKEY_CURRENT_USERSoftwareMicrosoftWindows
      CurrentVersionRun “75319611769193918898704537500611”
    • HKEY_CURRENT_USERSoftwareMicrosoftWindows
      CurrentVersionRun “ieupdate”

If all goes well, this fake Antivirus 2009 software should now be removed from your computer.

Enjoy!

http://www.CubeSquare.co.cc

How to Remove Antivirus Security

Antivirus Security is a (fake) rogue anti-spyware program. Often contracted from popup advertisements on sites pretending to be online anti malware scanners, the visitor may encounter fake security alerts saying your computer is infected and you should download and install Antivirus Security to fix the problem. If the visitor decides to download and install the software, it will scan your computer, summarizing and listing all sorts of security risks that cannot be removed unless you proceed to purchase the program.

This fake Antivirus Security may also install a shortcut labeled Protection Center in the Control Panel. This is a false Windows SecurityCenter that will say you have no Antivirus protection attempting to direct you back to the Antivirus Security homepage where you can download and install the software.

If this looks like what has happened to your computer, read on to learn the simple solution to remove this fake Antivirus Security once and for all.

Removing Antivirus Security (Automatically)

  1. Download and install Malwarebytes Anti-Malware software
  2. Run the software and perform a simple scan to detect and remove Antivirus Security

Note: Although the Malwarebytes tool will remove this threat for Free, if your existing Antivirus solution let the threat through, I highly recommend Purchasing the Pro version of Malwarebytes Anti-Malware for live protection and future malware threat prevention.

Removing Antivirus Security (Manually)

  1. Delete the following flies from your computer:
    • %UserProfile%DesktopAntivirus Security.lnk
    • %UserProfile%Start MenuAntivirus Security
    • %UserProfile%Start MenuAntivirus SecurityAntivirus Security.lnk
    • %UserProfile%Application DataMicrosoftInternet ExplorerQuick LaunchAntivirus Security.lnk
    • c:WINDOWSsystem32scui.cpl
  2. Click Start > Run, type regedit and delete the following registry entries:
    • HKEY_CURRENT_USERSoftware
      9178374C66E059CC11C19DCD899FD538
    • HKEY_CURRENT_USERSoftwareMicrosoftWindows
      CurrentVersionUninstallAV9

If all goes well, this Fake Antivirus Security should now be removed from your system.

Enjoy!

http://www.CubeSquare.co.cc

Comodo Internet Security 5.4.189068.1354

Platform: Windows
Last update: 5 May 2011
Developer: Comodo
File type: .exe
File size: 34.3 Mb
License: Freeware
Categories: Antispyware
Antivirus
Firewalls
Downloads: 1565

Comodo Internet Security is the free, multi-layered security application that keeps attackers out.

Built from the ground upwards with your security in mind, Internet Security offers 360° protection by combining Antivirus protection, an enterprise class packet filtering firewall, advanced host intrusion prevention and automatic sandboxing of unknown files.

Unlike the stripped down versions of commercial software that other software vendors offer for free, this is the full, completely functional version of the product.

Kaspersky Internet Security 2012 12.0.0.374

Platform: Windows
Last update: 7 June 2011
Developer: Kaspersky Lab
File type: .exe
File size: 67 Mb
License: Evaluation
Categories: Antispam
Antispyware
Antivirus
Firewalls
Downloads: 46400

Kaspersky Internet Security combines all the latest technological developments from Kaspersky Lab to protect your PC from malicious code, repel network attacks and prevent spam. All product components integrate seamlessly to prevent system conflicts and ensure high operating speeds for your computer. These components include antivirus, antispam, anti-spyware, and our personal firewall.

Script Sentry 2.7.1

Platform: Windows
Last update: 10 September 2002
Developer: Jason Levine
File type: .zip
File size: 164 Kb
License: Freeware
Categories: Antivirus
Hardening
Downloads: 2533

Windows Scripting Host (WSH) is a double-edged sword. On one hand it can be used to make some very useful scripts to automate common Windows functions. On the other hand, it can be very easy for a malicious user to make a virus using WSH. Script Sentry allows safe scripts to run on your system while alerting you if a script might harm your system. In addition, Script Sentry prevents against malicious scripts hidden in ShellScrap (hidden SHS and SHB extensions) files, Word/Excel macro viruses, malicious HTA files, and accidentally run REG files.

You can specify which scripts/files should be allowed to run and Script Sentry will invisibly allow those to run. Script Sentry is a “set it and forget it” application so it takes up exactly 0MB of memory unless it’s needed.

NOTE: Script Sentry is not a replacement for a good anti-virus program, but a supplement to it. An anti-virus program might stop a script virus once you update it’s virus definition files, but before you do that the virus has a window of opportunity. Script Sentry simply helps close that window.

Microsoft Security Essentials

You can’t put a price on protection. So we didn’t.Download high-quality antivirus protection for your home or small business PC-for free*.

Download it free* today

Completely free*
Easy to use
Award-winning technology
Automatic updates

Microsoft Security Essentials can also be used by small businesses on up to 10 PCs!

About Microsoft Security Essentials

Microsoft Security Essentials provides real-time protection for your home or small business PC that guards against viruses, spyware, and other malicious software.

Microsoft Security Essentials is a free* download from Microsoft that is simple to install, easy to use, and is automatically updated to protect your PC with the latest technology.

Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without interruptions or long computer wait times.

Before installing Microsoft Security Essentials, we recommend that you uninstall other antivirus software already running on your PC. Running more than one antivirus program at the same time can potentially cause conflicts that affect PC performance.

Read the Microsoft Security Essentials Privacy Statement and License Agreement.

Need security for your business?

Microsoft Security Essentials is available for small businesses with up to 10 PCs. If your business has more than 10 PCs, you can protect your computers with Microsoft Forefront Endpoint Protection.

* Your PC must run genuine Windows to install Microsoft Security Essentials. Learn more about genuine Windows. Internet access fees may apply.

Key Features

Comprehensive malware protection

Simple, free download*

Automatic updates

Easy to use

How to Guide: Remove Windows Verifying Center Virus (Manually Uninstall Rogue Windows Verifying Center)

Fake Windows Verifying Center Description

Windows Verifying Center is determined by Tee Support Labs as fake security software. Fake WindowsVerifying Center is a new member from the same family with Windows Examination Utility, Windows Work Checker and Windows Monitoring Utility etc.. FakeWindowsVerifyingCenter disguises as a real security software to mislead a lot of people to think it is legitimate and expect it to protect their computers, yet most antivirus fail to catch Windows VerifyingCenter as a threat even though it does make a lot of troubles to your system. Fake WindowsVerifying Center also uses fake scan and false positives to set up a trap for innocent computer users, all it want is to make you activate it and give your credit card information.

Fake Windows Verifying Center comes without your invitation and notices, but once it comes, it will take very powerful steps, launching a campaign to smash your system. It starts with a quick scan and reports your computer with a great deal of virus, errors and poor performance which may scare a lot of people to submit payment to update Windows VerifyingCenter. Fake WindowsVerifying Center gives pop-ups to further push people to but its license.

Those are some of the fake pop-up warnings displayed by Windows Verifying Center:

“Microsoft Security Essentials Alert
Potential Threat Details
Microsoft Security Essentials detected potential threats that might compromise your private or damage your computer. Your access to these items may be suspended until you take an action. Click ‘show details’ to learn more.

Threat prevention solution found
Security system analysis has revealed critical file system vulnerability caused by severe malware attacks.
Risk of system files infection:
The detected vulnerability may result in unauthorized access to private information and hard drive data with a serious possibility of irreversible data loss and unstable PC performance. To remove the malware please run a full system scan. Press ‘OK’ to install the software necessary to initiate system files check. To complete the installation process please reboot your computer.”

Windows Verifying Center Identified as Security Threat by Impressions

  1. Windows Verifying Center reputation/ rating online is terrible.
  2. WindowsVerifyingCenter is installed/ run without your permission.
  3. The official website of Windows Verifying Center is poorly built without contact info.
  4. The payments website of Windows Verifying Center is suspicious & claims your OS is unsafe.
  5. Poor Performance like highly-consumed system resources is caused by Windows VerifyingCenter.

Windows Verifying Center Step-by-Step Manual Removal Instructions

1.The associated files of Windows Verifying Center to be deleted are listed below:

%AppData%\Microsoft\[random digits].exe

2.The registry entries of Windows Verifying Center that need to be removed are listed as follows:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce "[random digits]"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe "Debugger" = 'svchost.exe'
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows

(Note: If you haven’t sufficient expertise in dealing with program files, processes, .dll files and registry entries, it may lead to mistakes damaging your system.)

Remove Security Shield 2011 Virus (Fake Security Shield 2011 Manual Removal Step By Step)

Security Shield 2011 is a fake security program which is cleverly disguised to behave like legitimate Anti-Spyware software. Security Shield 2011 displays lots of misleading popup alert messages and fake system scan results to scare users and push them to buying its useless software. It promotes mostly through the use of Trojans, fake online anti-malware scanners, malicious websites, and ads, entering your system secretly without your awareness. When this Virus is on board, it will tell you that your computer is infected with various threats, asking you to purchase its full version in order to remove all the infections. No matter how Security Shield 2011 boasts of itself, it will never protect you from cyber threats, for it is a big threat itself and may cause irrevocable damage to your system. Therefore, in order to secure the stability and normal operation of an infected PC, you should show no mercy to this vicious rogue when it is found in your computer. Security Shield 2011 prevents from scanning by antivirus application and needs to be removed manually.

Security Shield 2011 Identified as Security Threat by Impressions

  1. Security Shield 2011 reputation/ rating online is terrible.
  2. The official website of Security Shield 2011 is poorly built without contact info.
  3. The payments website of Security Shield 2011 is suspicious & claims your OS is unsafe.
  4. Poor Performance like highly-consumed system resources is caused by Security Shield 2011.

Security Shield 2011 Step-by-Step Removal Instructions

1) The associated processes of Security Shield 2011 to be stoped are listed below:

 %UserProfile%\Application Data\[random digits]\[random digits].exe

How to stop Security Shield 2011 related processes

2) The associated files of Security Shield 2011 to be deleted are listed below:

%UserProfile%\Application Data\[random digits]\[random digits].exe

3) The registry entries of Security Shield 2011 that need to be removed are listed as follows (Take Note: Back up the Windows registry before editing it, so that you can quickly restore it later if something goes wrong.):

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce "[random digits]"

Read more how to delete Security Shield 2011 registry entries