Blur Store - The Best Gadget Store

Online shopping from the earth's biggest selection of gadget and just about anything else.

All of cool stuff will be there, so enjoyed bro..

Powered by Blogger.

Popular

Blogger templates

Counter Powered by  RedCounter
powered by PRBbutton

Blogger news

below ad

Cool search

translate

About

Making destructive Windows virus,solve it

Annoyed because your computer is always the target virus is created by people with a high ability programming? why not just revenge. Because my computer is also affected by the virus then I create a virus as a sign of revenge, but until now the virus destroyer windows I Rename "Windows Shooter" because it has not I still remember my sins:), as a sense of revenge in me posting this then I will tell how to make a destructive Windows viruses, so you think revenge can be satisfied





1. Prepare your Visual Basic, this virus using Visual Basic in pembuatannya



2. Create a new project



3. Type the following script



Private Sub Form_Load ()

On Error Resume Next
Kill "c: \ aa.txt"
End Sub



on the Kill "c: \ aa.txt" is a formula that is used to delete files aa.txt located in the C, you can change the "c: \ aa.txt" with the path such as path wondows, so that when the program is run akan delete all files in the windows directory



4. Publish exe project



Can not be how the size of the effect caused by the virus

Clearing the way Newest Virus Conficker

date of April 1 virus conficker aka downadup aka kido latest official released. According to this new type of anti-virus company Kaspersky Russia is different from the previous variants. Conficker download updates to itself from some web sites change. He also uses the local network as a path to obtain updates. And do not forget, conficker have a mechanism to turn off security features.

As we know before, conficker spread using the MS08-067 slit on MsWindows. Users who have not mempatchnya (menambal) cleft is very vulnerable exposed to this virus. Update Kido made in March and began yesterday actively the new system on 1 April 2009 is considered more difficult. What do Kido, with command over 50,000 domain random per day, the criminals make the action difficult to predict. In fact, the computer network of the victim Kido aka Downadup this can be used to perform the attack Distributed Denial of Service (DDoS). In addition, the botnet can be used to perform action data theft and spam to spread.

Following ways to clean the virus conficker, quoted from here:

Cleaning the entire computer and server

1. Install the patch from Microsoft that the rift MS08-067, MS08-068, MS09-001.
2. Make sure that the local administrator account password can not be easily diterka-password must consist of at least 6 characters which is a mix between capital letters and non-capital, numbers and special characters such as punctuation.
3. Turn off features that run the file in a USB flash disk automatically.

Peranti KKiller.exe can be run locally on the computer that is infected or run a remote bantukan with Kaspersky Administration Kit.

To Delete The Local

1. KKiller_v3.4.3.zip Download and extract the package to a folder in the computer that is infected.
2. Run the file KKiller.exe. When the scan is complete, bsia command prompt window appears on the screen. To me, that minimize the window, press any ombol. So that the window is closed automatically, it is suggested KKiller.exe gar run with the parameter "-y".
3. Wait until the scan selesai.Bila Agnitum Outpost Firewall installed on computers that run KKiller.exe, restart after KKiller.exe.
4. Make a full scan on the computer with Kaspersky Anti-Virus.

To Delete the Administration Kit

1. KKiller_v3.4.3.zip Download and extract the contents into a folder.
2. In the console Administration Kit, create installation packages for KKiller.exe. In the package installation, select "Make installation package for speficied executable file." In the box "command line executable file (optional)" any posts of the parameters "-y" to the console window is closed automatically after the process is complete.
3. Create a task for remote installation can be done globally or only a certain group. Run the task. KKiller.exe can be run on all computers in the network.
4. When KKiller.exe work is completed, scan the computer using Kaspersky Anti-Virus.Kalau Agnitum Outpost Firewall is installed on the computer, restart the PC after KKiller.exe used. To obtain additional information, run KKiller.exe with additional parameter "-help".

Computer Virus Distribution Method via Yahoo Messenger

Today, I fell ill by computer viruses. Gara garanya-time message with a friend that happens on-line are suddenly appearing in my yahoo messenger screen a message from a friend who also are on-line. I think that he was to send me a web address to see (the messages that appear on my screen message that time is a web address), I just click directly. And in fact one and all ... gubrakk ... muncullah the virus. Automatic message and friend, I also experienced similar things like me. Fortunately he was quick to catch more and ask me: "What is this? Not just a spam?" I answered: "Virus ..!" terlanjur because I have to click. :-( (



Method of distribution of this virus through yahoo messenger. So one and all, if an when we are preoccupied asyiknya-chat with friends and then appears a message from a friend who at that time we are also on-line that displays a web address (unfortunately I do not remember what the web address, the terlanjur panic ..) better direct diclose aja. Because once we click the address of the virus will automatically attack all account records at contact us. A pity that our friend does not know what I suddenly emerged virus. Because so happened to me, so my friend to confirm that he is sending the packet says he does not know if it is a virus. She said to get it from friends. Perplexedly kan ..?



My (new) found three viruses on my computer, the Worm. Win32.VB.ck, IM-Worm.Win32.Sohanad.ai and Trojan-Downloader.JS.Small.dn. The characteristics of this virus (I know the new) he will be the first attack on the system application internet explorer and change the homepage address we have on our setting. And it automatically shut off option for change. So .. so we connect to the internet that appears first is the web site: quicknews.info. The second characteristic is the way we enable yahoo messenger will appear warning from anti-virus we used (if it works correctly).



Now I have to help one and all, first please inform this matter to my friends brother. And the second for between one and all know that there are ways to recover its share knowledge to help me. I have scanned the computer but the virus is immune to my anti-virus. He can not be deleted. Hii ... eerie .. kan? For information I use Active Virus Shield (free edition) from Kaspersky Lab.



Hopefully we can take ibrah from this incident. :-( (

Greatest Antivirus made in INDONESIA (SMADAV)

We pride for a son of Indonesia, the son of Indonesia has been able to make a great anti-virus, SMADAV, to Indonesia.

SMADAV Why?



1. SmaRTP technology, smart-Protection

* Secure the light in the world, fastest and least resource using the computer.
* Does not only depend on the number of databases / signatures, but also have brains (smart algorithm) that can protect computers from viruses even new.
* Automatic detection dicolok flash immediately after the computer.
* Automatic detection when a virus when you are to explore the folder
* Can be combined perfectly with all the protection any antivirus product.
* Support all OS Windows XP & Vista

2. Scanner smart

* Antivirus scanner technology fastest in the world, there are only Smadav, at least use the computer resource.
* Heuristik many methods for pendeteksian new virus and not in the database
* Database of virus in Indonesia because it has a database that combined smart method pendeteksian virus
* Have the feature "1 virus by user" and pendeteksian level computer security system "risk value"
* Support all OS Windows XP & Vista

3. Cleaner

* Only delete the file and the virus did not delete the document
* Infected document will be clean and returned as
* Automatic mengkarantina documents that can not be clean, and does not delete
* Support all OS Windows XP & Vista

4. Registry Cleaning & repair

* More than 1000 registry value will be scanned and cleaned by Smadav
* To work as a registry repair, computer performance will be better and faster
* Support all OS Windows XP & Vista

5. Update

* Smadav continue to follow the development of the virus in Indonesia menyebarluas
* Smadav will continue to be revised on an ongoing basis in the period of change depends on the development of virus
* Revision Smadav akan always released every 1,2,3, or 4 weeks.
* Without the update Smadav also have very smart to recognize the independent virus
* You can monitor the Update Smadav www.smadav.net

6. Manual of weapons is very easy to use

* 1 Virus by Users, selidiki which files on your computer to make strange, then basmi with smadav.
* Process Manager, you can monitor and manipulate all processes in memory
* System Editor, change the setting-important and confidential setting in windows

7. Free

* You do not need to pay less to use the full Smadav
* There is only ad / ads / banner on the site and program Smadav to cover the cost of development & hosting site Smadav
* You can become a donor to support the development of anti-virus technology in Indonesia

8. Team Smadav is a professional team

* Founder / Programmer, is a student in one of the leading sectors in the University of Indonesia and Freelancers (remote workers) experienced in the company Freelance & Programming in the U.S., with a 9.75/10 rating and has completed more than 50 programming projects.
* Team Smadav is a team of antivirus terhandal and volunteers Indonesia
* Has 3 divisions supro (programmer support), viser (virus researcher), and forweb (web & forum)
* Seriously, just practice aims to promote science and technology, aimed not at profit

9. Portable and support all Windows OS

* Does not need to install
* Only one file. Exe size is very small
* Not always in the hard disk, can be put in flash, CD / DVD, or other removable media.
* Support all OS Windows XP & Vista to all of the features in Smadav (Scanner, SmaRTP, Registry-Cleaner, etc.).

10. Site best antivirus and it

* Site is lightweight, fast, and beautiful in www.smadav.net
* Upload a virus very easily and quickly in viri.4shared.com
There are forums for discussion and antivirus ask for help
* There is a place to chat in the Smad-Chat www.smadav.net
* Site Nafarin.com as viruses and antivirus information in the latest

11. Features Secret?

* For the next revision, Smadav Team has prepared a lot of secret features are amazing
* These features are very confidential extraordinary, new, and especially Indonesia akan surprising Smadavers (Smadav Users)
* Programmers are developing this feature, and if it is perfect akan immediately released
* What features are confidential? as confidential so wait time later ...

Sophisticated anti-virus | anti virus the most powerful | that most anti-virus ...

Virus ... spooky, afraid to make the most of the fear orang.Ada lost data, operating system error, computer etc. die.

Finally, look for anti virus the most powerful to maintain komputernya.Tapi in fact even make the computer slow and still are exposed to the virus as well.

Anti virus is actually a computer program, which serves to detect the existence of a file / script / treat / etc command which has the potential to damage the data, or system.Dan a tool that is used in an anti-virus virus database.Inilah heart or ability to actually anti-virus ..

So no anti-virus database which can recognize various treat, will not be able to do apa.Makanya need to update the anti virus.dan Update itself there are two kinds,

1.update database, To add to the introduction of anti-virus virus later.

2.Update program, used to update anti-virus capabilities in handling a particular virus.

Now, when asked if anti-virus is the most powerful? I will say, anti-virus that can restore files or file system data, such as before the re-exposed to the virus. But there is like that?!.

According to my experience, there has been no anti-virus such as a FREE itu.Contohnya:

1. PCMAV (pc media anti virus), anti-virus is synthesized (made) by the pcmedia in bonuskan magazine for buyers ini.Anti virus is quite good settingan to restore the system (windows) which has been amended by virus.Seperti Pendekar blank, blue fantasy etc. . But he can not restore the infected file exe virus (Virus infektor).
2. ANSAV (an Anti virus's) Anti-virus RTP is tolerable good, he can recognize the virus as virut and sality, but pengenalannya and sometimes too extreme for its service (ansav guard) sometimes make the computer system bogged down (hang) time booting.Cara press it (Crtl Alt del) select shut down> Logoff, and logon again .. The more he can have a plugin that versatile and durable .. :)
3. Avast, Anti virus technology is sophisticated, he has a VRDB, the function can restore files that a virus, which is at once recognize update.Tidak as other anti-virus will delete files after diupdate.Kekurangannya he has not been good in the restore file ter the infection.
4. NOD 32 Anti virus cleanernya best possible at this time, because I use the stand alone version of its (free) to restore the exe file is infected with the virus.
5. Antivir, may have friends who use a lot of this anti-virus, but I never use belum.Karena friend ribet popupnya with, so I can work effektif ...:).
6. And others, paid or free, and all have less lebihnya as anti virus.

In conclusion, if we use one of the anti-virus, and we want to secure from viruses do:

1.Update virus database ... avast antivir ... ... ... Or the other ...

2.beri input to the vendor (the anti-virus) in a way to send a sample virus, trojan, etc. or Fals alarm (file not detect the virus, as viruses). For material to update anti virusnya ...

3.Cari anti-virus detects the virus more quickly locally, because we are in the Indonesia.Percuma the use of anti-virus does not recognize virus indonesia ...:): P

4. If there is a suspect file, please use Anti Virus Scan Online is the anti-virus to detect it is the best at this time .... :)

Happy learning ...

Nine dangerous virus that attacks the HP / Ponsel

Beware of HP / Ponsel you affected virus that causes damage to the HP / phone. For the case, the more you recognize that kind of name that the virus circulating in the HP / Ponsel. This is the nine virus terganas time this century in the world mobile phone: 1.CABIR
Cabir is the first Symbian virus is the most popular and to this day. Including the type of Cabir worm spreads through the Bluetooth connection to the phone and go through your message inbox with the names that draw attention. If you click it and install it file.sis, Cabir will start looking for new prey Bluetooth mobile phone with access to open, for menginfeksinya.
Cabir is also known by the name SymOS / Cabir.A, EPOC / Cabir.A, Worm.Symbian.Cabir.a, viruses and Caribe. Variannya has been developed to supplement ABC last Cabir.Z. Cabir.Z actually is a variant of Cabir B, only using the name of spreading velasco.sis.
Cabir Bluetooth will enable you to periodic, approximately 15-20 minutes to find prey. No damage to files, which means, only if you are infected phone, the battery will be used as needed to search for other Bluetooth devices.
To prevent this, turn off (disable) the Bluetooth feature you. Activate only when you want to use. And the need to remember is do not install Symbian applications caribe.sis with the name or names of the bizarre.
Next .... to the virus-2 is the music. We see and note ulasannya ... yuk.

2. Postcard
Postcard entrance in a family type of mobile phone virus worm. This virus spreads via MMS, Bluetooth connection, and exchange the memory card with the name beracak (random) xxx.sis.
Type of music manifold. The most general, the music spread via Bluetooth. Some variants can also send MMS to random contacts that are in your Phonebook.
Music not only have one name. The withdrawal criminals, he also has a fictitious name or alias as Postcard [anvir recognized by F-Secure], SymbOS / Postcard [McAfee], SYMBOS_COMWAR [Trend Micro].
When this is the last variant Postcard Postcard T. Postcard Q and Q only menginfeksi Symbian version 8.1 or older. In addition to the sporadic spread, the virus will also open a html page on your mobile phone with the message:
Introduction Surprise! Your phone infected by worms Postcard v3.0. Matrix has you, music inside. No panic please, is it very interesting to have mobile virus at own phone. This worm does not bring any harm to your phone and your significant data. About Postcard wor for Nokia Series 60 provides automatic real-time protection against harmful Anti-Virus content. Postcard is free software and is distributed in the hope that it wil be useful, without warranty Anya. Thank you for using CommWarrior.CommWarrior 2005-2006 by e10d0r.

3. Skulls
Virus is a virus called the skulls SymbOS.skulls or full name. Skulls classified Trojan is a change in the mobile phone system and the icons change to the main menu of the skull image. Initially, this Trojan called Extended theme.sis, but now many will be found with the name skull.sis.
Some type of virus variants have been spread. In the variants skulls.A somehow he does not give effect whatsoever. However skulls.C and H and S, almost all the icon changes to the skull ... ... serem Hiiii.
When installation H variants Skull, bring the notification "Install 'beta'_092_free-sms-RM8" Skull whereas S displays the "Install BlueNum Stealer."
Not only change the icons, skulls are also able to disable applications that icon now been amended. Generally, when we squeeze an application then the icon that appears is a message system eror. Hiiiii ... ... serem banged yah ... ..

4. DOOMBOOT
Although not spreading seganas computer virus, but the damage caused by Doomboot quite serious enough.
SymbOS.Doombot full name. This virus also has a fictitious name, among other Doomboot [F-Secure], SYMBOS_DOOMED [Trend Micro].
When this variant doombot manifold. There Doomboot A, C, L, M, G and P. Doomboot including Trojan virus category. Variant Doomboot.A put and make the files corrupt and danger, after the mobile phone menginfeksi, he will put the other viruses such Commwarrior.B into your phone. The system file is corrupt before the phone can not do podići.
SymbOS.Doomboot.A for example, to penetrate your phone with games like Doom2 installation files that have been dicrack. Usually called Doom_2_wad_cracked_by_DFT_S60_v1.0.sis. While Doomboot C infiltrate the fictitious name "exoVirusStopv 2:13:19", similar to the name of anti-virus mobile phone.
If you receive the file and install it, you will not receive any message after the technical. You also will not think that the phone has been infected because there is no sign of any icons or after the installation process.
Commwarrior.B the diisikan by Doombot to the mobile phone will automatically run and spread through Bluetooth connections. This will result in mobile phone batteries consume excessive, so that the battery runs out quickly.
Parahnya, akan Doomboot create a mobile phone can not do when you are booting off the phone and turn back.
Terlanjur If you do reboot, the only way you can do is do hard reset. Consequently, most of the data that you have saved as images, voice and other data to be lost berbekas not. Very not be pitied?

5. APPDISBLER
Performance AppDisabler actually similar to Doomboot. He will put the files Locknut viruses such as Cabir B and Y in the system to your mobile phone.
AppDisabler also menggandeng skulls and akan A jigger system icons you menajadi picture skull. The more egregious, the virus will stop the performance of the operating system and also some third-party applications. Hiii ... sereeeemmm.

6. CARDTRAP
CardTrap is the first mobile phone virus tries menginfeksi Windows based computer with a virus to put 2 files in the memory card to phone. If the card is connected at any time menginfeksi computer.
Variant CardTrap more bearable. Berhuruf of variants such as single CardTrap P, Q, R, S to beraksara variants ganda sepert CardTrap AA, AG, AJ, and so on.
Usually CardTrap menyaru with the names of the game or application such as KINGKONG, Half Life, Battefield 2 and others. CardTrap Z, for example, menyaru with the name SeleQ 1.7 - CrackedTNT.sis.
CardTrap damage the system is shut off with some of the applications built in Symbian. The virus is also quite capable of sophisticated, so some type of crippling anti-virus. Furthermore, if there is an opportunity to connect to the computer, CardTrap akan trying to plant a virus in Windows-based PC.
Some variants such as CardTrap Z can also turn off the keypad, disarrange applications of third parties, and distribute the files to corrupt the memory card in to the system lead to chaos.

7. LOCKNUT
Locknut or full name SymbOS.Locknut virus is a Trojan that operate using the Symbian S60 system weaknesses. This virus can be classified as critical because the binary file on the system ROM. Locknut eventually can cause the operating system stopped and the phone crashes.
This virus has many fictitious name, among other Locknut [F-Secure], SYMBOS_LOCKNUT [Trend Micro].
Symbian mobile phone which is exposed to this virus has features will show a message or a message as follows:
App. closed
AppArServerTh
Read
In addition, this virus also has a lift to the form alias virus Cabir virus that will follow if the virus is installed Locknut menangkiti your phone. Some variants also terangkai Caribe virus with this virus Locknut.
Locknut E, one of the variants locknut akan damage important files on the Symbian operating system and the applications installed that can not be opened. This effectively makes your phone is locked.

8. PBStealer
Say, PBStealer is one mobile phone virus created by people of Indonesia (made in Indonesia euy,, need to be valued and award the author nih hahahaha).
PBStealer have alias SymbOS / Pbstealer (Symantec), is a Trojan application that correspond to the contact listed in the Phonebook, and then you will save in the form of text files (*. txt).
Glance it is not dangerous. However, the steps undertaken PBStealer selanjutnyalah that you must create alert.
PBStealer next akan txt file to send to another phone via Bluetooth connection. Can not be? If in your contact numbers there are important and used for evil?
PBStealer D, one of the variants PBStealer can also send files and mengkompile contains contact, to do list, notepad and databases at once.
D PBStealer distribute themselves with how to submit 2 application berekstensi SIS file that is ChattingYuk.SIS and PBCompressor.SIS via Bluetooth connection.
Also a great virus PBStealer is prodek home ga ... Oops I feel we now review the latest virus that is RommWar We see and note ulasannya ... yuk.

9. RommWar
SymbOS / Rommwar (by Symantec), including Trojan category. This type of virus akan placed a kind of small programs to target mobile phone. The program will then be able to make the phone experience malfungsi target.
Symptoms aberration function depends on the software version of ROM on your phone. Effects caused by RommWar also vary. Start from the hang, restart the phone itself, to the power button did not work. However, in some cases, these symptoms do not appear and the phone can run as usual.
Virus RommWar this layakanya a Symbian application berekstensi. Sis. His name can be changed various. The application can be very seduce you and make teratarik to install. For example theme.sis, bunga_citra.sis, xxx.sis and others. During the installation process, typically displays a RommWar strange.
Until now, SymbOS / Rommwar has developed has 4 variants, namely:
a. RommWar.A
RommWar.A akan give effect varies, depending on the version of the software ROM available in your phone. Variant is the first mobile phone experience and must hang on the restart again. Shortly after the restart, the phone will hang back. To do so, take advantage of this function RommWar MIME recognizer.
b. RommWar.B
The magic, the two variants RommWar this phone will restart itself and will prevent your phone to do the booting. Is not severe? Is not severe?
c. RommWar.C
Same as version B. This virus will prevent your mobile phone to work!
d. RommWar.D \
This latest variant RommWar cause various effects, the phone can not start a flame until the power button did not work. Interestingly, installation SymbOS / RommWar, sometimes also ditumpangi by the installation of Kaspersky Anti-Virus Mobile is not perfect.

Top 20 virus,This is the dangerous virus in the Month of May 2009

Want to know what virus entry in the top 20 viruses in the month of May terganas ago? Who can have one of the top 20 virus lodged in your PC. In the previous month, there are 20 viruses that are very dangerous and this time there are two new viruses in malware attacks. List of virus-virus terganas is released by one of the leading antivirus company Kaspersky Security Network. Next there are two lists prepared by Kaspersky:

The first list, which is inhabited dangerous programs (Malware), Adware, and unwanted programs are the most commonly detected by the computer user. Virusnya list:

1. Net-Worm.Win32.Kido.ih
2. Virus.Win32.Sality.aa
3. Trojan-Dropper.Win32.Flystud.ko
4. Trojan.Win32.Autoit.ci
5. Trojan.JS.Agent.xy
6. Exploit.HTML.CodeBaseExec
7. Trojan-Downloader.Win32.VB.eql
8. Trojan.Win32.Chifrax.a
9. Virus.Win32.Virut.ce
10. Virus.Win32.Sality.z
11. Worm.Win32.AutoRun.dui
12. Packed.Win32.Krap.b
13. Packed.Win32.Black.a
14. Worm.Win32.Mabezat.b
15. Virus.Win32.Alman.b
16. Packed.Win32.Klone.bj
17. P2P-Worm.Win32.Palevo.ddm
18. Trojan.Win32.Swizzor.a
19. Exploit.JS.Agent.agc
20. Email-Worm.Win32.Brontok.q


No significant changes in the Top 20 in May with the virus Top 20 in April, the only two newcomers in the list, that is, the P2P-Worm.Win32.Palevo.ddm and Trojan.Win32.Swizzor.a.

The spread of P2P-Worm.Win32.Palevo.ddm than the public network through various peer-to-peer, also menginfeksi through storage media, making it easier for distribution. While Trojan.Win32.Swizzor.a utilize some interesting and sophisticated tricks to hide the code, and disguise the presence in the system.

Second list, Kaspersky provides data on which programs most evil menginfeksi objects detected on the user's computer. Virusnya following list:

1. Virus.Win32.Sality.aa
2. Worm.Win32.Mabezat.b
3. Trojan-Clicker.HTML.IFrame.aga
4. Virus.Win32.Virut.ce
5. Net-Worm.Win32.Nimda
6. Virus.Win32.Xorer.du
7. Virus.Win32.Sality.z
8. Virus.Win32.Parite.b
9. Virus.Win32.Alman.b
10. Virus.Win32.Virut.q
11. Net-Worm.Win32.Kido.ih
12. Virus.Win32.Small.l
13. Email-Worm.Win32.Runouce.b
14. Worm.Win32.Fujack.k
15. Virus.Win32.Parite.a
16. Virus.Win32.Virut.n
17. Virus.Win32.Hidrag.a
18. Virus.Win32.Sality.ae
19. Worm.Win32.Otwycal.g
20. Trojan.Win32.Swizzor.a


Seen from this list, Trojan-Clicker.HTML.IFrame.aga, up to rank third, but still below the rank Virus.Win32.Sality.ae. IFrame.aga is one of the many versions of an iframe that is now spread by using Virus.Win32.Virut.ce for menginfeksi to the web page. While Sality.ae is the latest version of the famous Sality virus.

Source: www.detikinet.com

What, you never meet with one of the types of virus-virus?

Kido family's most dangerous, Net-Worm.Win32.Kido.ix

hmmm, its the end of this virus on me as well. One of the family of malware kido. This virus is the actual impact is not too dangerous, the family does not like the others, who menginfeksi svchost.exe. Viruses have distinctive, that is very difficult to be liquidated, even Kaspersky Lab to face difficulties in sndiri. Autorun.inf it can not be haphazard, it is necessary to remove the software sndiri, combofix.exe mengkin prevent one. Hati2 but in practice this software. Note each dy give you warning, because what ... because it will affect the performance of our computer. One device that I attacked my portable hard drive is, he is embedded in the recycler folder, it is very difficult for me to remove it, because there is a recycler in the banyk of data. A little info, the first family kido top risk or the most dangerous activities on the internet. Kaspersky kido put over a month as the most dangerous. Even KK.exe or kidokiller.exe provided by Kasper sendri can not overcome the Net-Worm.Win32.Kido.ix, eits, but Kasper gave a solution in them, try reading the forum, the website "kaspersky.com". Net-Worm.Win32.Kido.ix is dangerous variants with ix as the marker. Kido growing very fast because it can spread through LAN. I have to know more please share ...

New Worm On Yahoo! Messenger will Gosod dangerous Browser

Foster City, California - May 22, 2006 - Experts in the research FaceTime Security Labs ™ identified and reported to the threat of a new worm on the Yahoo Messenger. Facetime scientists confirm the existence of a new worm called yhoo32.explr. This worm will install a web browser by the name of 'Safety Browser' and will put spyware on the PC of the victim. Because Safety Browser uses the same icon with IE, then the victim can easily mengasumsi that it is Internet Explorer. This is the first incidence of a malicious software (malware) to install their own web browser on a PC without user consent. Worm that can reproduce itself is spread through contact list of Yahoo! Messenger on a PC that was infected, how to send a link to the website at the time of the user are in talks messenger. This link will lead to a website that will upload the file to the victim in the PC, and installs Safety Browser. Spam over Instant Messenger link is always known as Spim. According to Tyler Wells, Senior Director of Research at FaceTime Security Labs, "This malware is one of the most bizarre and most dangerous that we met in several years." "This is the first case where a PC web browser hijack without the user's awareness of their own. Some type of browser 'evil' is similar, such as' Yapbrowser 'have been demonstrating the potential for serious damage by directing users to content that is potentially illegal," he added. Description Name: yhoo32.explr Type: Worm and Browserware The target: Yahoo! Messenger Additional Information: Malware akan menginfeksi this PC with two elements. The first element is a web browser called "Safety Browser". Stand-alone application does not have this feature and uninstaller disguise themselves through the Internet Explorer logo. This application is also the home of the hijack Internet Explorer and directing users to the Safety Browser's homepage (demoplanet.tv). This application also play music repeatedly (loop) at the time of the user running Safety Browser. Second element is a worm that can reproduce themselves. Worm reproduce themselves in a way to enter a link in messenger conversations on the infected PC. When users who have been infected with a new conversation and join the conversation that already exists, a link will be inserted at a certain point in the conversation.

Worm Downadup, mem-block sites in Antivirus

In fact since a few days this opportunity to read / get information about the worm Downadup on some blogs about the security / virus / antivirus, but I leave it because the news only dikira normal worm. But the fact that many proclaim about this worm because the worm was "terrible" and sophisticated.

Based on estimates of F-Secure, a new worm variant has been menginfeksi almost 9 million computers in just 4 days time. Amount not less for the long worm that has not appeared.

Original name is Worm Worm: W32/Downadup.gen have different names and aliases, such as: W32/Conficker.worm.gen (Symantec), Mal / Conficker (Sophos), Worm: Win32/Conficker (Microsoft). In addition, also known by the name Conflicker and Kido (example name: Worm: W32/Downadup.gen! A, Net-Worm.Win32.Kido.ih). This category includes Worm Malware running on Windows 32-bit, that is called the W32.
Distribution of worm

The spread of this worm through various ways, such as the Network / network share or on a weak password, can also be spread by creating a file autorun.inf which triggered the copykan to Flashdisk USB (drive) or other removable media. So should the windows autorun feature is turned off to prevent the addition of various other viruses.

world-map

Worm exploit this rift security for Windows menginfeksi victims, like the previous article What's with the Windows Security Update MS08-067. Worm will create a folder with a random name in the directory RECYCLER (the Recycle Bin is used to store the file that was deleted) also duplicate themselves in various other places.
Effect Downadup Worm

And that this may make me write this article, some visitors ebsoft written comments that they can not open the antivirus sites, and may cause this is a worm.

This worm is able to change / add a function of internal windows (TCP) to block access to sites security (security / antivirus), with a filter that has the characters address / text specific. And to eliminate the effect is not easy, because it may be spelled already low level programming level.

Worm is designed to protect themselves from detection by using anti-virus techniques that are used infrequently, protect themselves from the effort to remove, turn off windows update, restore point prior to infection, kill a certain network traffic, to optimize the features of Windows Vista to facilitate the distribution, is able to inject explorer . exe, svchost.exe and services.exe and other.

Sites on the block quite a lot, including the web using the text as follows (in the block can always display the message or Time Out when opening the site):

* Virus
* Spyware
* Malware
* Rootkit
* Defender
* Microsoft
* Symantec
* Norton
McAfee *
* Trendmicro
* Sophos
* Panda
* Etrust
* F-secure
* Kaspersky
* F-Prot
* NOD32
* Eset
* Grisoft
* Avast
* Avira
* Comodo
* Clamav
* Norman
* Pctools
* Rising
* Sunbelt
* Threatexpert
* Wilderssecurity
* Windowsupdate
* AVP
* Avg

It also sites other security.

Greatest TRICKS to Handle VIRUS/ Worm

hmm.,,,hello bro,,
You are have worm / virus that cause none antivirus / removal that you have not cleared? Do not re-format your computer first. Follow the following review .... Emang what tricks the greatest? Clear whether through Safe Mode? Yes, but apparently it only applies to virus / worm abroad. While the virus / worm that can enable smart himself through Safe Mode where the trick is first digawangi by BRONTOK. Followed by virus / worm the other. Then what? What me-rename/menghapus Run-Time Library msvbvm60.dll? Yes, but it is only valid for Malcode created with Visual Basic 6.0 language. While in Indonesia have been scattered many virus / worm is created with the computer language C + + and Delphi. Moreover the Malcode have learned to handle this. Namely with the backup of this msvbvm60.dll, prevent Users work with especial msvbvm60.dll initialization method (the withdrawal when you write in a document, you can not delete or me-renamenya), even with the method of virtual machine that is required by the virus / worm cases such as VB-BLUE Fantasy ERIKIMO up-to-copy msvbvm60.dll with the name of thumbs. db ago the parent file that has been previously oprek-oprek lead to a virtual machine to its thumbs. db which is msvbvm60.dll. So what is? What makes anti / removal to its own. But what fate Normal user can only be basic computer operations course? While the computer is being pro-ria restart once every 10 minutes. So what? Is to make the correct Hard Disk-infected by virus / worm as a slave in another computer. Slave? Period of Hard-Disk disamain want the same girl? That is so. You can remove the Hard-Disk on the infected computer and install the other as an additional Hard-Disk. So the virus / worm that is in the Hard Disk You can not move slightly as the OS that will be used on another Hard Disk. But you must be careful. Do not be so until the computer is infected passenger participate. How simple is that me-msvbvm60.dll temporarily rename the computer in the passenger Malcode if that is in the Hard Disk you created with VB6.0. Then, through a computer virus load is clean / worm that is on your Hard-Disk. The very best way is to delete the file mother. However, the deletion will not be rejected because the file is not berproses parent. Unless you are running it. Could have been unlucky, the computer can be a passenger took digentayangi same virus / worm that is on your Hard Disk. Basic tricks this step can be said as follows: ~ Hard-Disk dislodged the infected virus / worm from your computer. ~ Place in a clean computer from viruses / worms ~ Make sure the computer load the hard-disk to its own. ~ Turn on the computer load. ~ Make sure the Operating System used in the Hard-Disk clean with a virus / worm. ~ Through computer virus clean lodging / Worm on Your Hard-Disk. ~ However, the virus / worm does not akan slightly in the computer load. ~ If you are simply re-install a clean Hard-Disk on your computer. Hey? This means we must have the ability to analyze more in Malcode. Evidence we need to know the existence of the file from the parent virus / worm that is in the Hard-Disk not we? Yes, yes indeed. But this is how the most powerful of the way there. Why? Coba aja. If you are (just example lho ..) Folder Options hidden virus / worm, we can use it. If the folder Windows / System does not work we can open it easily. The point of all activities undertaken by the virus / worm will stop. So we will simplify the cleaning process. Tricks should not be done by a Newbie without guidance from an Advance Users. What can only increase the problem if there is a mistake. So until now I still find the more powerful tricks again. But until now, this trick is still the most powerful.

Crash Sites Download Windows 7 RC

time to download Windows 7 RC (Release Candidate) is opened by Microsoft for the MSDN and TechNet subscribers. Unfortunately, Microsoft again to repeat the error when the offer Windows 7 Public Beta some time ago. Due to the high traffic activity download, Microsoft site also slowed, and eventually crash. During the hour-long customers who tried to enter a disappointment because it can not reach the download page. According to Microsoft spokesman, the problem is caused by the SQL Server database that experienced excessive fragmentation hikes due to high demand. However, when this problem can be surmounted Microsoft.

Final version of Windows 7 in August Finish

Microsoft divulge more prepare to welcome the launch of the operating system teranyarnya Windows 7. Appropriate information from one of the developers team blog says the Windows version RTM (release to market) which is the final version is produced for mid-August. "We hope to complete in three monthly RTM lah," write Brandon LeBlanc, a member of the Windows 7 team blog. However, he stressed that even the RTM version of the settlement will not be done in a hurry to ensure quality. It is well-founded because when Windows Vista was released many of the problems that consumers found. The biggest problem, especially the hardware specs, drivers, applications that do not support, and disrupt the security alert. Windows 7 digadang presence of large-Microsoft can overcome the problems faced in Windows Vista. Even Windows XP can do the migration mulus as Windows 7 features XP Mode so that the application that way in XP is also the way in Windows 7. Previously made, ensure that Microsoft Windows 7 will be available in the market at year-end holidays. One of the partners original equipment manufacturer (OEM) Acer has announced akan even sell notebooks with the Windows 7 start in October.

Mcaffe found the most damage new virus

A new virus has been found, and classified by Microsoft as the most damage! New virus is found on Sunday afternoon ago by McAfee, and have not found a vaccine for mengalahkannya. This destructive virus Sector Zero from the hard disc, a save function of the most important information. The virus is running as follows: "H the virus is automatically sent to all akan name in your address list with the title" A Card For You "(Une carte Pour Vous, atau A Card For You); "H the virtual card is opened, the virus that will freeze the computer so that users must start again, if you hit CTRL + ALT + DEL to restart or command, the virus that will damage the Boot Sector Zero from the hard disk, hard disk so that it will be permanently damaged . According to CNN, the virus is already in a few hours cause panic in New York .. This warning has been received by Microsoft employees themselves. Do not open e-mail with the title "A virtual card for you" (Une carte Virtuelle Pour Vous or A Virtual Card For You). Send this message to all your friends. I think that most people, like myself, prefer to get a warning this 25 times than not at all. CAUTION! Do not accept a contact, "pti_bout_de_ chou@hotmail.com". This virus will format your computer. Send this message to all those who are in your address list. If you do not do this and one of his friends in the list enter your address, your computer will also be affected. URGENTTT !!!!! ATTENTION !!!!! To a friend - all friends, If one day you receive the e-mail with a Powerpoint Presentation titled "Life is beautiful.pps", was opened with a DO NOT for any reason, and delete it immediately. When you open the page file, then you will be on display legible "Now it is too late, your life is nolonger beautiful", then you akan Overall WHETHER LOSS OF DATA, SOFTWARE, PROGRAMS OR ANY like YA NG INSIDE your PC, this jenisvirus and damage the very people who get mengirimkanya akan namaakses, e-mail & password. That was a new type of virus that started on the Saturday night and there is no anti virusnya. The creator of this virus was a hacker who claimed himself as the owner of Life danakan against Microsoft in justice menegakan. Therefore the virus itudatang disguise themselves as pps extension. Source: http://student.logika.ac.id/mod/forum/discuss.php?d=35

Problems Installing Windows XP

Saturday night I experienced a little difficulty when installing Windows XP in the notebook to Lenovo 3000 N200 type. This notebook is the property my office colleagues. Lenovo notebook is already contains Windows Vista (preinstalled), I requested to replace the existing Windows Vista into Windows XP. Problems that arise are the installation of Windows XP system can not recognize the hard drive installed in the notebook. Error messages that appear likely to say that hard disk is protected by the manufacturer (manufacturer) or have incorrect settings. I got an error that the image appears as follows:

Problems occur when the system installation of Windows XP has just begun. This is the second time I have things like this. Some months ago I also had dimintai please Edi by my friend to "remove" Windows Vista in a notebook from the Fujitsu Lifebook S6410 owned Edi my colleagues. The same error message occurs.

Ok back to the first installation of Windows XP on Lenovo earlier. First I try to boot the first Windows Vista already installed in the Lenovo. Because the words "manufacturer-supplied Diagnostic or setup program" on the error message above, the logic says I definitely have another partition on the hard disk in a deliberately hidden and hinder the process of installing Windows. So easy to see how the hard drive partitions, I installed Acronis Disk Director to easily manage the existing partition. With the help of Acronis Disk Director, I see there is a partition size of around 6GB partition other than Windows Vista. I know that it is the partition where the program saves the recovery of Windows (factory default). I just delete the partition, and yet Windows Vista is no longer needed in this notebook. After I delete the partition, I again try to boot Windows XP installation CD. I was the same message still appears, to its hard drive is not recognized: ((

Untung last night I was in a condition fit for ngoprek:-p Soon I asked Google, read the read-while I can enlightenment here. I have to turn off SATA in the BIOS options. I try to search in the search-in the BIOS this is Lenovo. The menu looks like the picture on the following:

I change the option to be the choice Compatibility. Somehow I have a feeling it-so why is the problem. After that I try to run again the installation of Windows XP and in fact the correct steps before the finish. With the option to change SATA controller mode, the current Windows XP can recognize the hard drive and immediately go to the installation (before the menu displays the partition, the system displays the End User Agreement first). The installation of Windows XP itself, as I have described previously here.

Feeling successfully solve the problem on the Lenovo before, so my spirit to prove the theory before the Fujitsu Lifebooknya Edisaya try to run the installation process of Windows XP on Fujitsu-nya Edi. Fujitsu Lifebook Bios menu is slightly different with its Lenovo BIOS. I have to change the AHCI setting in the menu under the "Internal Device Configuration". See the image below:

Had earlier read-read in Wikipedia, AHCI (Advanced Host Controller Interface) is a technology that allows software to communicate with the SATA controller to provide a capability such as hot-plugging and Native Command Queuing. Detail please refer to themselves yes, quite a bit-I ngerti bacanya also be one of the better read you own: D So conclusion is notebook-notebook with Windows Vista the default OS (the average is to use SATA type hard drive) is using technology AHCI . It will be a problem if we want men to be Vista-XP downgrade. So to install Windows XP in a notebook preinstalled Windows Vista, we first need to turn off the feature / option on the AHCI setting-an SATA controller.

Repairing the damage from computer system because virus on Windows


Computers that have been exposed to viruses, malware and the like are usually many features that are not running normal (system / windows were damaged). For example, Task Manager, Run, Command prompt that can not walk, and sometimes to certain files such as EXE, COM and other also can not run.

Such damage usually can be corrected either manually, using the CD or the Windows software with third parties.

If we have a CD master windows, and damage is quite severe, usually can still be solved using the Repair feature (read: me-How to repair (repair) Installasi Windows XP)

This time will be discussed how to improve the system that is broken windows caused by the malware, viruses and the like or for other programs with the System Repair Engineer (SREng).
System Repair Engineer (SREng)

System Repair Engineer (SREng) is a small program (less than 2 MB), portable and free (free) in the KZTechs.COM developed by the webmaster, Smallfrogs (Microsoft has been getting awards Most valuable Professional (MVP) for Windows Shell - in China from 2004-2008). This program is intended to detect common system problems and damage the public are often caused by computer viruses.



To the level of experts (advance), this program can be used to detect and fix problems themselves. While for regular users (general public), there is a Smart Scan function to check the computer and the report (the report) so that can be stored for further analysis and the review by the more expert.

Nevertheless, there are various features that can be used directly even though by most computer users. Here some explanation of the features and functions that we can take advantage of.
Boot Items

Display a list of programs or applications are automatically run when windows booting, both from the registry (including hidden items, and other UserInit), Folders, Scheduled Task, Services and Boot.ini. If you notice a strange program (suspicious), then we can stop with aktifkannya way to check it.



Once removed the check, then click the Refresh button, to ensure that the conversion has been saved. If the check appears, or return a new list appears with the name of the other, is a strong indication that the computer is being infected with viruses or other malware (preferably computer / hard drive in well with the scan Bootable CD, portable virus scanner, or transfer Hardisk on another computer and scanned from there).
System Repair

sreng-system-repair

In this menu there are several separate functions, which are:

File Association

Display the extension status of general files such as. TXT,. EXE,. COM,. PIF,. Reg. BAT,. SCR,. CHM,. Vbs and other. If the status does not indicate "Normal" or we can not run the file with one extension, then we can fix by selecting the file extension is problematic, and click Repair.

Windows Shell / IE

In this section, we will see a list of list-windows settings (settings) that are usually modified / damaged by the virus, such as:

* Menu Start / Run is not active
* Registry Editor (regedit.exe) can not be opened
* Command Prompt, wallpaper, Control Panel can not be accessed.
* Drive in My Computer does not appear
* Log off button does not appear
* Menu "File" in Windows Explorer does not appear
* Icon on the desktop does not appear
* Folder Options can not be activated
* Key search (search) does not appear
* Windows Explorer or the system tray can not be in the right-click
* To display the hidden files (Hidden files)
* Many of the view menu in Internet Explorer that does not appear
* Various other settings

To improve the above settings, select from the list and click Repair.

Browser Add-ons

Display a list of plugins / add-ons (additional features) that are running the web browser used. We can see the detail information, hide or remove the add-on that is not desired.

Hosts file

Hosts file is a list of host name and IP address mapping. For example there is a line as follows:

127.0.0.1 localhost

Means that when we type localhost in the web browser will be mapped to the IP address 127.0.0.1. For more information can see http://support.microsoft.com/?id=108295

This file can be changed by spyware or malware so that when writing the web address is actually assigned to a specific IP address that is not true.

Winsock Provider

Will display a list of Windows Sockets API (Winsock), which handles network access, especially TCP / IP.

In this menu there are features of "All Reset to default values", which can be used if an internet connection can not be run as before (problems) or when all of a sudden we can not browse, email or other network operations, and an internet connection to run normally.

But when the network connection is running well and we can browse, send email or do other network operations, not recommended for the Reset. Read more about Winsock

Advanced Repair

There are two settings in this menu, the Recommended Level Fix and Fix Powerful Level. There is also the key for me-Reset Winsock, memperbaki Safe Mode and Scan To Hook API (advanced).
Smart Scan

Smart scan will scan the computer to generate reports in detail about the computer system which can be used by people more qualified to review and address computer problems.


Extensions

SREng supports additional features that can be added separately (can also create additional / plugins themselves). On the page Download SREng included some plugins such as:

* NTFS Stream Scanner, to check the NTFS format of the data is dangerous
* Windows Shell Menu Manager, to set the menu, such as windows shell menu when right-click the desktop and the other.
* File Figital Sign Verify, understand and verify a digital signature file.
* Network Activity Monitor, to monitor activity / status of the network and provides detailed information about the connection.



One thing that might be a bit less is not the help files (manual) in English, the language in China and discuss itupun still version 2.5. Apart from that, this program is very useful and can be run on the operating system: Windows 98SE, ME, 2000, XP 32bit, Server 2003 32bit, Vista 32bit, Server 2008 32bit.

Free Avira anti virus premium + license 2014


Avira is one of the anti-virus do well enough, so I give avira anti virus is the latest to you for FREE.
Avira that i give you, this is Avira Premium do with Expired License in the year 2014.

On the site authorized Avira premium with this with price Euro 19.95, for 1 PC for 1 year. But here I give a free - free for FREE and FREE for 5 years.

In the latest Avira Premium has a few functions do not a lot of aliases, including:

- AntiVir keep your computer from virus attacks, Trojan and Worm
- AntiRootkit keep your computer from hidden Rootkit I
- AntiPhishing keep your computer from phishing
- Antispyware keep your computer from spyware and adware
- Faster Scanning up to faster 20% of other Anti-Virus
- WebGuard keep your computer from the website you suspicious
- AntiDrive halt activity-by download malware impromptu surfing at the time
- RescueSystem create a bootable rescue CD

For more information please visit the authorized website.

you may choose this link :
avira premium software
license 2014

Registry Corruption After installation of Windows XP SP3

Symantec Corp. to remind all consumers that use security products such as Norton Internet Security, Norton AntiVirus, and Norton 360, that before the installation of Windows XP Service Pack 3, have to do to disable the feature SymProtect to avoid the risk of a loss of some data on the computer system. SymProtect, a feature technology designed to protect the security software from malware. Symantec found evidence that when XP SP3 installation, there was the addition of a false key in the number of registers in the register a lot of Windows users.

In a few hours after Microsoft launched Windows XP SP3, many users do complain about the content of Device Manager and ending the free Internet connection or wireless network. Then the user find the content of the register in which so many false and all the data therein berawalan character ""$%&".

Symantec refused to register the case that this error. In the last week, Symantec accuse Microsoft file named fixccs.ex, part of the XP SP3 package, which has produced key inputs to the register so that the slump in the user register. Symantec but eventually realized that the error that caused computer system this problem occurred from a combination of file fixccs.exe and SymProtect that Symantec has said that the file will add fxccs.exe register key processes occur during SP2 update and then delete the key is added, while SymProtect work to prevent the removal of a key is added fixccs.exe because it will change the register keys in the existing register. Symantec has been providing instruction to turn off all the different variations SymProtect title in Norton.

Development of Computer Virus Origin

The virus first appeared in the world called [Elk Cloner] was born about 1981 in TEXAS A & M. Spread through Apple II floppy disks that have operating systemnya. The destroyer mendisplay this message on the screen: "It will get on all your disks, It will infiltrate your chips-yes it is Cloner!-It will stick to you like glue-It will modify RAM too-send in the Cloner!" Hi ... ... ... ... ... ....

The name "virus" that sendiiri new diberkan birth after 2 years by Len Adleman on 3 November 1983 in a seminar on how to create a ngebahas virus and protect themselves from viruses. But those orangorang often assume that the virus first appeared is a virus [Brain] that was born in 1986. Reasonable aja, soalnya virus is the most appalling and most extensive distribution karean crawling through a DOS diskette that time again ngetrend. Also coincides with the birth of [PC-Write Trojan] and [Vindent]

Start at that time, `the world the virus starts. Development of chilling and sangar! intermittent one-year virus first appeared menginfeksi file. Usually the attack is the file *. exe berekstensi the virus is called [suriv] included in the virus "Jerusalem". Speed distribution is' throb 'to that time. But this virus ngga 'too bad ko' soalnya virus disciplines and slam its IBM Mainframe real 'old-old, just one year (the year that long eh what a ya ...?)

1988, BIG attacks appear to Machintosh by the virus [MacMag] and [scores] and the Internet network dihajar completely artificial virus by Robert Morris. In 1989 there are fraudulent people who ngirim file "AIDS information program", and Unfortunately, once this file is opened, which is not obtained information about AIDS, but the virus mengenskrypsi hard drive and charge for the code pembukanya (hehehe ... ... .. there is no-way aja What the money)

Since that time, the spread of the virus is real 'keitung again. However, the impact that caused it 'is too large. New in 1995 appears a large-scale attacks. I 'half-hearted, they nyerang large companies, among Griffith Air Force Base, Korean Atomic Research Institute, NASA, IBM and many other giant COMPANY persecuted by the "Liberation INETRNET FRONT" on the day of Thanksgiving ~ ~. Because of the courage and fury attack, 1995 dijuluki year as the Hacker and cracker.

The cracker is never satisfied. Each operating system appears or a new program, they are ready with the new virus. You often ngetik with MS Word may have nemuin virus Titassic. This virus local native Indonesia lho ... and unique, the virus ngingetin we make this prayer on time (waduh, I also learned ..) But do not wrong, macro viruses that have the title [concept] can also be evil, and vicious sangar banget . What is learned that this evil is potential ngemusnahin 80% of data files and program the victim.

Now, along with the development of technology, the virus first appeared mengkombinasi a macro virus and worm. His name is sweet [Melissa]. But it 'semanis name, this potential virus spread to other people via E-Mail and the most painful, it is potential nyebar to all e-mail address on your address book. And at this time millions of viruses that appear bergentayangan ngga 'known in the Internet.

Be careful with new handphone virus 2009

Here is the news about the latest virus news for cat owners mobile phone. This is not a virus attacks the computer, but the mobile phone. How it works like a computer virus. This virus came from Europe and start sdh attack the United States and Asia (June news - InfoMedia edition July 2001), sdh now go to Indonesia.How it works: 1. Akan your handphone rings and name appeared on the screen, among others: XXX, YYY, OOO, 123 2. When you receive a code on the mobile phone screen as such, should not be appointed / accepted, let alone to die deringnya own.3. After the "missed call" check-in call daftaf register your phone, you will get the letters XXX, YYY, OOO, 123. Tampa without the name and other identity.4. Back to the main menu of your phone screen. 5. Try again call-register/missed to call you. 6. Odd number is not lost ..... weird ..! If you receive such things do, it means that someone is being tried to send a virus in your phone. Motif: generally the perpetrators chose victims at random, can the people in their own country or can also from abroad. They usually get your phone number, when you enter the phone number via the internet for making a registration or e-mail confirmation of payment. after the success of the virus to enter in your phone, the virus will send the data identity, No SIMCARD and your PIN (if you are post-pay subscribers GSM) and Personal Identification Number and No SIMCARD you (if your GSM prepaid customers). of data can do it, that person can use your credit from long-distance and use your identity for the things you bad. So that you will suddenly run out of credit or slowly (because your credit is used simultaneously with the perpetrator).How the virus: 1. Successful virus entry, it will immediately attack your simcard and send you useful information for the perpetrator. 2. Virus will soon deplete your balance. 3. The virus will move to the HP software in your 4. Virus akan settle and hold bercokol in your HP Software, so if you think akan SIMCARD for change, with the virus will immediately attack you SIMCARD new.5. After a certain time Virus akan bust your software, and HP ......... Tamatlah history you will not be used again and fix it.6. Gawatnya, if your phone is linked page on the computer / modem, then the page akan virus attack your computer. Heartland already infecting: Surabaya and Bandung Perhaps the only accecories Can you use only Casing and Bateray. Hopefully this information is useful for them and I have the HP for their playful SMS.Original Source Intra media Malaya, Malaya design group

i hope it will help you to get information about virus
Photobucket

Virus Windows Media Player Making Computers' sigh '



Golden Ghost virus or virus that is W32/Agent.GYMR fraudulent and sigh, and then access playboy.com. Following characteristics of viruses is:



1. The emergence of an error message "16 bit MS-DOS Subsystem" when the computer switched on.
Golden Ghost

2. Changing the name of the owner and the name of the organization into the computer:

* RegisteredOrganization = GoldenGhost.Inc
* RegisteredOwner = GoldenGhost

Golden Ghost

3. Adding a string GoldenGhost -= =- Was Here on the file C: Boot.ini so at the time of booting a Windows menu will appear with the name of additional GoldenGhost Was Here =-

Golden Ghost

The virus is made using the program language Visual Basic and compressed using UPX, the size of this virus is quite large around 1.312 KB. To trick the user it will use the icon "Windows media player."
At the time of the file in the virus run it will create some files that will be run by parent every time the computer is turned on / restart in the following locations:
• C: Windows folder%%% file%. Exe (random)
• C: folder Windowssystem32%%% file%. Exe (random)

Here are some of the file name that will be in a (random)
• devil.ocx
• pluto.ocx
• capiw.exe
• dusiw.exe
• gexuw.exe
• GoldenGhost.exe
• mamuv.exe
• ridec.exe
• msvbvm60.dll
• heluh.exe
• muxim.exe
• quniw.exe
• gutum.exe
• helef.exe
• kabuh.exe
• mideg.exe
• tixec.exe
• vuvey.exe

So that the file can be run automatically, it will create a string in the registry below:
• HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCur rentVersionrun
o GoldenGhost = C:% SystemRoot%%%% File Folder%. exe or C:% windir% folder%%% Files. exe
• HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon
o Shell = Explorer.exe C:% SystemRoot%%%% File Folder%. exe or C:% windir% folder%%% Files. exe

To defend himself virus akan windows to block some functions such as:
• Disable function "paste"
• Disable run
• Disable Searh
• Disable FolderOptions
• Disable Recent Documents menu
• Right-click Disble
• Disable CMD
• Disable RegistryTools
• Disable TaskMgr
• Not able to display the hidden files

To do this it will create a string in the registry below:
• HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurr entVersionExplorerAdvanced
o Hidden = 2
o HideFileExt = 1
o ShowSuperHidden = 0
• HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentV ersionPolicies
o = NoClose Explorer
• HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentV ersionPoliciesexplorer
• NoFInd
o NoFOlderOption
o NoRecentDocsMenu
o NoRUn
o NoSaveSettings
o NoSetFolders
o NoTrayContextMenu
o NoViewContextMenu
• HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentV ersionPoliciesSystem
o DisableCMD
o DisableRegistryTools
o DisableTaskMgr
• HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrent VersionExplorerAdvancedFolderHidden
type o = --
o HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrent VersionExplorerAdvancedFolderHideFileExt
type o = --
o HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrent VersionExplorerAdvancedFolderSuperHidden
type o = --

This virus will also create a string in the registry below:
HKEY_LOCAL_MACHINESOFTWAREGoldenGhost.A
- AppAll = tupin.exe (random)
- AppMirc = heluh.exe (random)
- AppOther = quniw.exe (random)
- AppSetan = gutum.exe (random)
- AppUtama = muxim.exe (random)
- Location = C: WINDOWSSystem32config (random)

In addition to the function block on Windows, it will also be trying to block security tools such as proceexp, curr preoces, pocket killbox, security task manager and other tools. Besides changing the name of the owner of Windows, it will also change the primary address into Internet Explorer with http://www.playboy.com/ first create a string in the registry below:

HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain
- Start Page = http://www.playboy.com/

Hosts file windows also do not escape from the attack of this virus manghapus with the contents of the file "C: WindowsSystem32Driversetchost", then add string @ echo off on the file "C: autoexec.bat", then add the string "-= =- GoldenGhost Was Here" on the file "C: boot.ini" so that every time the computer booting a menu will appear with the name GoldenGhost =- Was Here, and if this menu is selected then the computer will restart.

This virus will also alter the results copy and paste the text into notepad desahan, with display text "Oohhh ... Aughhhh ... yess ... babbby ...!!" each time the user copy and paste the contents of text files. In addition to creating a duplicate file, the virus will also try to inject a file that has the extension EXE, the size of the file that was successful in this injection will be approximately 1312 KB of size at first, so if the user runs the file it will automatically run itself. Each time the computer is switched virus akan bring the message "error 16 bit MS-DOS Subsystem" error message will also appear how many minutes each time in accordance with the specified file and create a duplicate (random) in the directory "C: Windows", which was then file that is created will be removed again.

Golden Ghost

Golden Ghost

Here are some messages to be sent:
• nick, indonesia free sex picture double click on the url
• nick have ne new info Marshanda, Agnes Monica, Dian Sastro, Dah Bunga.C Which Bugil, liat Fotonya To double-click the url
• artis indonesia nude, double click on the url
• nick, indo artist magazine playboy double click on the url
• nick mo liat artis indo playboy magazine
• nick indonesia free porn, double click on the url
• ce indo nation, double click
W32/Agent.GYMR this virus will also use the flash disk as a medium itself with the spread of duplicates to create a file with the characteristics:
o Windows Media Player Icon
o Size 1312 KB
o Extension EXE
o File Type "Application"

Overcoming Virus Windows Media Player


As dikabarkan some time ago about the virus that can make computer 'sigh'. To remove this virus on the flash disk can begin to identify and remove files with the extension *. mov, *. wmv, *. 3gp, *. avi, *. mpg, *. mpeg.

Meanwhile, to clean the virus or the golden ghost W32/Agent.GYMR on how hard you can do the following:

To speed up the process of removal of the virus using tools "Ice Sword" (http://www.4shared.com/file/62289467/cf8da562/Ice_Swor d_v122.html? DirPwdVerified = feea1d94). Block the process that has Windows Media Player icon and then right click on the process and click "terminate Process."

Repair registry with a script to copy under this program in Notepad and save it with the name:

"repair.vbs" and run the file.
Dim oWSH: Set oWSH = CreateObject ( "WScript.Shell")
on error resume Next

* WSH.Regwrite "HKEY_LOCAL_MACHINESoftwareCLASSESbatfileshellopen command ","""% 1" "% *"
* WSH.Regwrite "HKEY_LOCAL_MACHINESoftwareCLASSEScomfileshellopen command ","""% 1" "% *"
* WSH.Regwrite "HKEY_LOCAL_MACHINESoftwareCLASSESexefileshellopen command ","""% 1" "% *"
* WSH.Regwrite "HKEY_LOCAL_MACHINESoftwareCLASSESpiffileshellopen command ","""% 1" "% *"
* WSH.Regwrite "HKEY_LOCAL_MACHINESoftwareCLASSESscrfileshellopen command ","""% 1" "/ S"
* WSH.Regwrite "HKEY_LOCAL_MACHINESYSTEMControlSet001ControlSafeB ootAlternateShell", "cmd.exe"
* WSH. Regwrite "HKEY_LOCAL_MACHINESYSTEMControlSet002ControlSafeB ootAlternateShell", "cmd.exe"
* WSH. Regwrite "HKEY_LOCAL_MACHINESYSTEMControlSet003ControlSafeB ootAlternateShell", "cmd.exe"
* WSH. Regwrite "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlS afeBootAlternateShell", "cmd.exe"
* WSH.Regwrite "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonShell", "Explorer.exe & quot;
* WSH.Regwrite "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogonsystem", ""
*
  • WSH.Regwrite "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionRegisteredOrganization", "Your Organization" WSH.Regwrite "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionRegisteredOwner", "YourOwner & q uot;
    * WSH.Regwrite "HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMainStart Page", "about: Blank"
    * WSH.Regwrite "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrent VersionExplorerAdvancedFolderHiddentype", "Gro up"
    * WSH.Regwrite "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrent VersionExplorerAdvancedFolderHideFileExttype", & quo t; checkbox "
    * WSH.Regwrite "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrent VersionExplorerAdvancedFolderSuperHiddentype", & quo t; checkbox "
    * WSH.RegDelete ( "HKEY_LOCAL _MACHINESoftwareMicrosoftWindowsCurrentVersionRunGolden Ghost")
    * WSH.RegDelete ( "HKEY_CURRENT_U SERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplor er")
    * WSH.RegDelete ( "HKEY_CURRENT_USER SoftwareMicrosoftWindowsCurrentVersionPoliciesExplorerN oSetFolders")
    * WSH.RegDelete ( "HKEY_CUR RENT_USERSoftwareMicrosoftWindowsCurrentVersionPolicies ExplorerNoFolderOptions")
    * WSH.RegDelete (& q uot; HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVer sionPoliciesExplorerNoTrayContextMenu ")
    * WS RegDelete H. ( "HKEY_CURRENT_USERSoftwareMicrosoftWin dowsCurrentVersionPoliciesExplorerNoViewContextMenu & quo t;)
    * WSH.RegDelete ( "HKEY_CURRENT_USERSoftwa reMicrosoftWindowsCurrentVersionPoliciesExplorerNoSaveS ettings")
    * WSH.RegDelete ( "HKEY_CURRENT _USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExpl orerNoRecentDocsMenu")
    WSH.RegDelete * ( "; HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersio nPoliciesExplorerNofind")
    * WSH.RegDelete (& q uot; HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVer sionPoliciesExplorerNoRun ")
    * WSH.RegDelete ( "HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentV ersionPoliciesSystemDisableTaskMgr")
    * WSH.R egDelete ( "HKEY_CURRENT_USERSoftwareMicrosoftWindow sCurrentVersionPoliciesSystemDisableCMD")
    * WSH.RegDelete ( "HKEY_CURRENT_USERSoftwareMicrosoftW indowsCurrentVersionPoliciesSystemDisableRegistryTools & quot;)
    * WSH.RegDelete ( "HKEY_LOCAL_MACHINESO FTWAREGoldenGhost.A")


    Delete the file and the parent virus duplicate files by using the search windows to show hidden files. If the folder option and the search has not been shown, then restart / logoff the computer first.

    Once the file is found, delete the file that has the size 1.312 KB. addition, remove the file:
    - Devil.ocx = 1 KB
    - Pluto.ocx = 1 KB
    - GoldenGhost.exe = 1 KB
    Remove the string @ echo off on the file [C: Autoexec.bat]
    Remove string GoldenGhost -= =- Was Here on file [C: boot.ini]
    Restore Host File Windows by using the tools Hoster (http://www.4shared.com/file/62290120/73265114/Host sXpert.html? DirPwdVerified = feea1d94). To merestore windows host file, click the "Restore MS Hosts File" on HosterExpert these tools.

    If you use Norman antivirus / McAfee / Kaspersky should re-install the antivirus and then scan the computer to make sure the computer is completely clean of viruses. Update Norman Security Suite is also able to improve any of the files that diinjeksi by W32/Agent.GYMR.
  • New Virus Variant Koobface attack Facebook and Friendster


    Still remember with Koobface virus that had previously attacked the popular social networking site, Facebook?

    Now comes the latest virus variants Koobface. However, it is surprising that there is a link in Facebook inbox page, which actually leads to the 'misguided'. On the front page looks familiar with YouTube, but false, complete with a fake comment from the 'viewer'. If the link is click, the user will be directed to a page hosting a video that is sent by the same person, who has been sending a message from Facebook earlier. The facts of the sender is not only a name, but also photos from the Facebook profile himself.

    With the click the "Install" it will directly download the setup.exe file is detected as a variant Koobface the latest security company TrendMicro detected as a worm "koobface.az". According blog.trendmicro.com, there have been more than 300 unique IP that has to click setup.exe. IP all the victims will be detected as "html_koobface.ba".

    According to the analyst's view of the engineer TrendMicro, worms koobface.az the first time will find the cookies created by the site Pertemanan as follows:

    * Facebook.com
    * Hi5.com
    * Friendst er.com
    * Myyearbook.com
    * Myspace.com
    * bebo.comtagged.com
    * Netlog.com
    * fubar.comlivejournal.com

    Worm will then connect with the social networking site is using user login detail, obtained from cookies. After that, the new worm variants akan find other friends, who will then send a message containing a link, where the worm copy to be downloaded by users. In addition, the virus will also send information from the infected computer to some server.

    Worm spread via spam on Facebook and MySpace

    The security company Kasperky Lab warned that the virus maker has created a pair of worm used to attack users of the MySpace and Facebook. Two variants have got the latest worm Koobface nickname, using social engineering techniques by using a website as a gateway to the victim computer menginfeksi akan make it part of a botnet network.

    When users with computers that have been infected with the worm to access to his MySpace account, then the variants Koobface akan-A link to the post in the "commentaries of friends" who will direct the user to click to a site that contains malicious programs. While the search for B-Koobface target Facebook users by sending spam messages to any "friends" from Facebook users who have tertulari virus.

    Message with some subject such as "Paris Hilton Tosses Dwarf On The Street" or as "Hello, You must see it! LOL. My friend catched you on hidden cam "and the other. The message is aimed so that the candidate pool to click a link that will take them to the website content that contains video clips that have been in pairs as a noose.

    Potential victims will also receive a message to download the "latest version of Flash Player" but which actually is a file with that name codesetup.exe bring worm Koobface.
    Alexander Gostev, a senior virus from Kaspersky Lab Analyst, said similar attacks could happen in the future. "At the beginning of the year 2008, we predicted that we will see an increase in cybercriminal who exploitation on MySpace, Facebook and a few similar websites, and now we have seen the evidence. I believe this is only the first step is simple, and the virus makers will continue to find the target from this source with the intensity increased, "he said in more.

    Local deracinate Virus Manually

    The various virus attacks the computer - with Microsoft Windows OS, of course - most people will consider how to obtain the latest antivirus and anti-virus specific to a particular local because most antivirus software is not able mendeteksinya. Different way of thinking is very common, I offer alternative solutions to the local membasminya virus manually.

    The virus is a program / application (= series of commands) that is able to reproduce themselves. Most programmers create a virus-virus as a series of commands that penetrate into the command-line commands in other applications. Virus-specific virus even able to sneak into the master boot record or sector specific in the disk with no special protection can be identified as a user file. Unfortunately this job jockey does not apply to most of the local presence of virus is very light and inviting hostility.

    Based on this weak point we can eradicate the virus local manually. There are two general reference in killing the virus manually stop running virus-virus and destroy the virus. Based on these two reference you can develop your own strategy depending on the cases that you face.

    Part I: Stop Running Virus

    To attack the virus is created with Visual Basic (VB) - there most virus made with the local VB - you can stop running with the virus' remove 'msvbvm50.dll and msvbvm60.dll which is in the directory c: windowssystem32 which is a virtual machine's program programs created with VB. The term 'throw away' can be realized in different ways depending on the circumstances or the taste, that is removed (not recommended), moved to another folder, or replaced with another name. Besides, how can be done in different ways depending on the level of virus from using the Windows Explorer, command prompt on Windows emulator (when the virus to disable the Windows Explorer), or have to run in windows mode 'save mode with command prompt only' by pressing F8 on the initial startup to display the windows startup menu. If the virus is still running, the virus is not created with VB and run to the next step you have to use Linux or another OS emulator that is not attached to windows programs.

    Part II: Removing Virus-virus

    To destroy the virus-the virus that you have to do is collect all the files through the application find the entry with the name *. exe, identify the applications which is a virus, and delete them. If the menu has been disabled by a virus, you can memanggilnuya by pressing F3 (far easier than have to edit the registry editor). Sentence to the application as the virus is highly dependent of experience and insting you, because the characteristics-characteristics can vary widely, but which must be a reference that you are looking for things' not as a proper and should be in place 'or hidden impressed. Applications with a Microsoft word Document icon or folder icon can be convicted as the virus directly, but with application icons also should be regular, if you suspect you do not believe anyone had to move there. To reduce the scope, you also need to pay attention to the file size because many viruses that each have the same file size.

    Applications that you have vonis as the virus should be removed immediately with a sift + delete. Previously, make sure all the data you've saved with the document and copy-paste in other places in the virus is not runnig. Good LUCK...

    New Virus Info

    A new virus has been found, and classified by Microsoft as the most damage! New virus is found on Sunday afternoon ago by McAfee, and have not found a vaccine for
    mengalahkannya.

    This destructive virus Sector Zero from the hard disc, a save function of the most important information. The virus is running as follows: The virus will be automatically sent to all names in the address list
    you with the title "A Card For You" (Une carte Pour Vous, atau A Card For You); the virtual card is opened, the virus that will freeze the computer so that users must start again, if you hit CTRL + ALT + DEL or commands to restart, the virus that will damage the Boot Sector Zero from the hard disk, hard disk so that it will be damaged permanently.

    According to CNN, the virus is already in a few hours cause panic in New York. This warning has been received by Microsoft employees themselves. Do not open e-mail with the title "A virtual card for you" (Une carte Virtuelle Pour Vous or A Virtual Card For You).

    "hoax Life is Beautiful", new virus

    Under this is the sound of the e-mail that contains the virus "hoax Life is Beautiful"
    The virus is also possible to send e-mail the same in Spanish, Portuguese, German, and Hungarian.

    It is too late now, your life is no longer beautiful", subsequently you will LOSE EVERYTHING IN YOUR PC and the person who sent it to you will gain access to your name, email and password.
    This is a new virus which started to circulate on Saturday afternoon.

    The antivirus Softs are not capable of destroying it.

    The virus has been created by a hacker who calls himself "life owner", and who aims to destroying domestic PCs and who also fights Microsoft in court! That's why it comes disguised with extension pps. He fights in court for the Windows-XP patent.

    MAKE A COPY OF THIS EMAIL TO ALL YOUR FRIENDS"
    If TERIMA E-MAIL TO THE CONTENTS OF SUCH IN IMMEDIATE Del! AND YOU DO NOT forward TO YOUR FRIENDS!

    News about the latest virus

    A new virus has been found, and classified by Microsoft as the most damage! New virus is found on Sunday afternoon ago by McAfee, and have not found a vaccine for mengalahkannya.

    This destructive virus Sector Zero from the hard disc, a save function of the most important information. The virus is running as follows:

    "H the virus is automatically sent to all akan name in your address list with the title" A Card For You "(Une carte Pour Vous, atau A Card For You);

    "H the virtual card is opened, the virus that will freeze the computer so that users must start again, if you hit CTRL + ALT + DEL to restart or command, the virus that will damage the Boot Sector Zero from the hard disk, hard disk so that it will be permanently damaged .

    According to CNN, the virus is already in a few hours cause panic in New York .. This warning has been received by Microsoft employees themselves.

    Do not open e-mail with the title "A virtual card for you" (Une carte Virtuelle Pour Vous or A Virtual Card For You).

    Send this message to all your friends. I think that most people, like myself, prefer to get a warning this 25 times than not at all.

    CAUTION!

    Do not accept a contact, "pti_bout_de_ chou@hotmail.com". This virus will format your computer. Send this message to all those who are in your address list.

    If you do not do this and one of his friends in the list enter your address, your computer will also be affected.


    URGENTTT !!!!!

    ATTENTION !!!!!

    To a friend - all friends,

    If one day you receive the e-mail with a Powerpoint Presentation titled "Life is beautiful.pps", was opened with a DO NOT for any reason, and delete it immediately. When you open the page file, then you will be on display legible "Now it is too late, your life is nolonger beautiful", then you akan Overall WHETHER LOSS OF DATA, SOFTWARE, PROGRAMS OR ANY like YA NG INSIDE your PC, this jenisvirus and damage the very people who get mengirimkanya akan namaakses, e-mail & password. That was a new type of virus that started on the Saturday night and there is no anti virusnya. The creator of this virus was a hacker who claimed himself as the owner of Life danakan against Microsoft in justice menegakan. Therefore the virus itudatang disguise themselves as pps extension. This news sent me by a friend (software engineering) who is now living in Singapore, Pan PC friends have been infected this virus.

    News about the latest virus

    A new virus has been found, and classified by Microsoft as the most damage! New virus is found on Sunday afternoon ago by McAfee, and have not found a vaccine for mengalahkannya.

    This destructive virus Sector Zero from the hard disc, a save function of the most important information. The virus is running as follows:

    "H the virus is automatically sent to all akan name in your address list with the title" A Card For You "(Une carte Pour Vous, atau A Card For You);

    "H the virtual card is opened, the virus that will freeze the computer so that users must start again, if you hit CTRL + ALT + DEL to restart or command, the virus that will damage the Boot Sector Zero from the hard disk, hard disk so that it will be permanently damaged .

    According to CNN, the virus is already in a few hours cause panic in New York .. This warning has been received by Microsoft employees themselves.

    Do not open e-mail with the title "A virtual card for you" (Une carte Virtuelle Pour Vous or A Virtual Card For You).

    Send this message to all your friends. I think that most people, like myself, prefer to get a warning this 25 times than not at all.

    CAUTION!

    Do not accept a contact, "pti_bout_de_ chou@hotmail.com". This virus will format your computer. Send this message to all those who are in your address list.

    If you do not do this and one of his friends in the list enter your address, your computer will also be affected.


    URGENTTT !!!!!

    ATTENTION !!!!!

    To a friend - all friends,

    If one day you receive the e-mail with a Powerpoint Presentation titled "Life is beautiful.pps", was opened with a DO NOT for any reason, and delete it immediately. When you open the page file, then you will be on display legible "Now it is too late, your life is nolonger beautiful", then you akan Overall WHETHER LOSS OF DATA, SOFTWARE, PROGRAMS OR ANY like YA NG INSIDE your PC, this jenisvirus and damage the very people who get mengirimkanya akan namaakses, e-mail & password. That was a new type of virus that started on the Saturday night and there is no anti virusnya. The creator of this virus was a hacker who claimed himself as the owner of Life danakan against Microsoft in justice menegakan. Therefore the virus itudatang disguise themselves as pps extension. This news sent me by a friend (software engineering) who is now living in Singapore, Pan PC friends have been infected this virus.

    bitdefender antivirus

    bitdefender is not strange with computer user, this one of wonderful antivirus product..
    you can use this antivirus to protect your computer from virus
    this is link taht you can use to download bitdefender antivirus :
    Download BitDefender Free Edition 32 bit <59 MB>
    Download BitDefender Free Edition 64 bit <70 MB>

    Install avira antivirus


    avira is very perfect antivirus for me, it help my pc to protect from virus, and i hope you can use avira antivirus too..and if you need install avira antivirus, you can choose avira antivirus link below to install

    if you want install avira antivirus, you may choose this link:
    http://dl1.avgate.net/down/windows/antivir_workstation_winu_en_h.exe(21.28 MB)

    or other link to install avira antivirus:
    http://dl1.avgate.net/down/windows/antivir_workstation_winu_en_h.zip( 23.29 MB)

    and other link to install avira antivirus :
    http://free-av.com/en/download/download_servers.php.(to install avira antivirus version 9)

    install avira antivirus may help you to protect your computer, ang i sugeest you to install avira antivirus right now,,n i hope you can use that link to install avira antivirus..
    thanks bro..
    n i just wanna say avira antivirus for the world like this :
    avira antivirus
    avira antivirus
    avira antivirus...............
    avira antivirus
    avira antivirus
    avira antivirus
    avira antivirus.............avira antivirus...avira antivirus.....avira antivirus...
    avira antivirus
    avira antivirus
    avira antivirus
    avira antivirus
    avira antivirus....avira antivirus, every body use it....
    avira antivirus
    avira antivirus
    avira antivirus
    avira antivirus
    avira antivirus
    avira antivirus
    avira antivirus>>n they will click that link, n use avira antivirus:
    http://free-av.com/en/download/download_servers.php.(to install avira antivirus version 9)
    hhahahahaha,,,,,but i dont have power...
    to say n right to ask some to use it..
    avira antivirus
    avira antivirus
    avira antivirus...............
    avira antivirus
    avira antivirus
    avira antivirus
    avira antivirus.............avira antivirus...avira antivirus.....avira antivirus...
    avira antivirus
    avira antivirus
    avira antivirus
    avira antivirus
    avira antivirus....avira antivirus, every body use it....
    avira antivirus
    avira antivirus
    avira antivirus
    avira antivirus
    avira antivirus
    avira antivirus