Blur Store - The Best Gadget Store

Online shopping from the earth's biggest selection of gadget and just about anything else.

All of cool stuff will be there, so enjoyed bro..

Powered by Blogger.

Popular

Blogger templates

Counter Powered by  RedCounter
powered by PRBbutton

Blogger news

below ad

Cool search

translate

About

Making destructive Windows virus,solve it

Annoyed because your computer is always the target virus is created by people with a high ability programming? why not just revenge. Because my computer is also affected by the virus then I create a virus as a sign of revenge, but until now the virus destroyer windows I Rename "Windows Shooter" because it has not I still remember my sins:), as a sense of revenge in me posting this then I will tell how to make a destructive Windows viruses, so you think revenge can be satisfied





1. Prepare your Visual Basic, this virus using Visual Basic in pembuatannya



2. Create a new project



3. Type the following script



Private Sub Form_Load ()

On Error Resume Next
Kill "c: \ aa.txt"
End Sub



on the Kill "c: \ aa.txt" is a formula that is used to delete files aa.txt located in the C, you can change the "c: \ aa.txt" with the path such as path wondows, so that when the program is run akan delete all files in the windows directory



4. Publish exe project



Can not be how the size of the effect caused by the virus

Clearing the way Newest Virus Conficker

date of April 1 virus conficker aka downadup aka kido latest official released. According to this new type of anti-virus company Kaspersky Russia is different from the previous variants. Conficker download updates to itself from some web sites change. He also uses the local network as a path to obtain updates. And do not forget, conficker have a mechanism to turn off security features.

As we know before, conficker spread using the MS08-067 slit on MsWindows. Users who have not mempatchnya (menambal) cleft is very vulnerable exposed to this virus. Update Kido made in March and began yesterday actively the new system on 1 April 2009 is considered more difficult. What do Kido, with command over 50,000 domain random per day, the criminals make the action difficult to predict. In fact, the computer network of the victim Kido aka Downadup this can be used to perform the attack Distributed Denial of Service (DDoS). In addition, the botnet can be used to perform action data theft and spam to spread.

Following ways to clean the virus conficker, quoted from here:

Cleaning the entire computer and server

1. Install the patch from Microsoft that the rift MS08-067, MS08-068, MS09-001.
2. Make sure that the local administrator account password can not be easily diterka-password must consist of at least 6 characters which is a mix between capital letters and non-capital, numbers and special characters such as punctuation.
3. Turn off features that run the file in a USB flash disk automatically.

Peranti KKiller.exe can be run locally on the computer that is infected or run a remote bantukan with Kaspersky Administration Kit.

To Delete The Local

1. KKiller_v3.4.3.zip Download and extract the package to a folder in the computer that is infected.
2. Run the file KKiller.exe. When the scan is complete, bsia command prompt window appears on the screen. To me, that minimize the window, press any ombol. So that the window is closed automatically, it is suggested KKiller.exe gar run with the parameter "-y".
3. Wait until the scan selesai.Bila Agnitum Outpost Firewall installed on computers that run KKiller.exe, restart after KKiller.exe.
4. Make a full scan on the computer with Kaspersky Anti-Virus.

To Delete the Administration Kit

1. KKiller_v3.4.3.zip Download and extract the contents into a folder.
2. In the console Administration Kit, create installation packages for KKiller.exe. In the package installation, select "Make installation package for speficied executable file." In the box "command line executable file (optional)" any posts of the parameters "-y" to the console window is closed automatically after the process is complete.
3. Create a task for remote installation can be done globally or only a certain group. Run the task. KKiller.exe can be run on all computers in the network.
4. When KKiller.exe work is completed, scan the computer using Kaspersky Anti-Virus.Kalau Agnitum Outpost Firewall is installed on the computer, restart the PC after KKiller.exe used. To obtain additional information, run KKiller.exe with additional parameter "-help".

Computer Virus Distribution Method via Yahoo Messenger

Today, I fell ill by computer viruses. Gara garanya-time message with a friend that happens on-line are suddenly appearing in my yahoo messenger screen a message from a friend who also are on-line. I think that he was to send me a web address to see (the messages that appear on my screen message that time is a web address), I just click directly. And in fact one and all ... gubrakk ... muncullah the virus. Automatic message and friend, I also experienced similar things like me. Fortunately he was quick to catch more and ask me: "What is this? Not just a spam?" I answered: "Virus ..!" terlanjur because I have to click. :-( (



Method of distribution of this virus through yahoo messenger. So one and all, if an when we are preoccupied asyiknya-chat with friends and then appears a message from a friend who at that time we are also on-line that displays a web address (unfortunately I do not remember what the web address, the terlanjur panic ..) better direct diclose aja. Because once we click the address of the virus will automatically attack all account records at contact us. A pity that our friend does not know what I suddenly emerged virus. Because so happened to me, so my friend to confirm that he is sending the packet says he does not know if it is a virus. She said to get it from friends. Perplexedly kan ..?



My (new) found three viruses on my computer, the Worm. Win32.VB.ck, IM-Worm.Win32.Sohanad.ai and Trojan-Downloader.JS.Small.dn. The characteristics of this virus (I know the new) he will be the first attack on the system application internet explorer and change the homepage address we have on our setting. And it automatically shut off option for change. So .. so we connect to the internet that appears first is the web site: quicknews.info. The second characteristic is the way we enable yahoo messenger will appear warning from anti-virus we used (if it works correctly).



Now I have to help one and all, first please inform this matter to my friends brother. And the second for between one and all know that there are ways to recover its share knowledge to help me. I have scanned the computer but the virus is immune to my anti-virus. He can not be deleted. Hii ... eerie .. kan? For information I use Active Virus Shield (free edition) from Kaspersky Lab.



Hopefully we can take ibrah from this incident. :-( (

Greatest Antivirus made in INDONESIA (SMADAV)

We pride for a son of Indonesia, the son of Indonesia has been able to make a great anti-virus, SMADAV, to Indonesia.

SMADAV Why?



1. SmaRTP technology, smart-Protection

* Secure the light in the world, fastest and least resource using the computer.
* Does not only depend on the number of databases / signatures, but also have brains (smart algorithm) that can protect computers from viruses even new.
* Automatic detection dicolok flash immediately after the computer.
* Automatic detection when a virus when you are to explore the folder
* Can be combined perfectly with all the protection any antivirus product.
* Support all OS Windows XP & Vista

2. Scanner smart

* Antivirus scanner technology fastest in the world, there are only Smadav, at least use the computer resource.
* Heuristik many methods for pendeteksian new virus and not in the database
* Database of virus in Indonesia because it has a database that combined smart method pendeteksian virus
* Have the feature "1 virus by user" and pendeteksian level computer security system "risk value"
* Support all OS Windows XP & Vista

3. Cleaner

* Only delete the file and the virus did not delete the document
* Infected document will be clean and returned as
* Automatic mengkarantina documents that can not be clean, and does not delete
* Support all OS Windows XP & Vista

4. Registry Cleaning & repair

* More than 1000 registry value will be scanned and cleaned by Smadav
* To work as a registry repair, computer performance will be better and faster
* Support all OS Windows XP & Vista

5. Update

* Smadav continue to follow the development of the virus in Indonesia menyebarluas
* Smadav will continue to be revised on an ongoing basis in the period of change depends on the development of virus
* Revision Smadav akan always released every 1,2,3, or 4 weeks.
* Without the update Smadav also have very smart to recognize the independent virus
* You can monitor the Update Smadav www.smadav.net

6. Manual of weapons is very easy to use

* 1 Virus by Users, selidiki which files on your computer to make strange, then basmi with smadav.
* Process Manager, you can monitor and manipulate all processes in memory
* System Editor, change the setting-important and confidential setting in windows

7. Free

* You do not need to pay less to use the full Smadav
* There is only ad / ads / banner on the site and program Smadav to cover the cost of development & hosting site Smadav
* You can become a donor to support the development of anti-virus technology in Indonesia

8. Team Smadav is a professional team

* Founder / Programmer, is a student in one of the leading sectors in the University of Indonesia and Freelancers (remote workers) experienced in the company Freelance & Programming in the U.S., with a 9.75/10 rating and has completed more than 50 programming projects.
* Team Smadav is a team of antivirus terhandal and volunteers Indonesia
* Has 3 divisions supro (programmer support), viser (virus researcher), and forweb (web & forum)
* Seriously, just practice aims to promote science and technology, aimed not at profit

9. Portable and support all Windows OS

* Does not need to install
* Only one file. Exe size is very small
* Not always in the hard disk, can be put in flash, CD / DVD, or other removable media.
* Support all OS Windows XP & Vista to all of the features in Smadav (Scanner, SmaRTP, Registry-Cleaner, etc.).

10. Site best antivirus and it

* Site is lightweight, fast, and beautiful in www.smadav.net
* Upload a virus very easily and quickly in viri.4shared.com
There are forums for discussion and antivirus ask for help
* There is a place to chat in the Smad-Chat www.smadav.net
* Site Nafarin.com as viruses and antivirus information in the latest

11. Features Secret?

* For the next revision, Smadav Team has prepared a lot of secret features are amazing
* These features are very confidential extraordinary, new, and especially Indonesia akan surprising Smadavers (Smadav Users)
* Programmers are developing this feature, and if it is perfect akan immediately released
* What features are confidential? as confidential so wait time later ...

Sophisticated anti-virus | anti virus the most powerful | that most anti-virus ...

Virus ... spooky, afraid to make the most of the fear orang.Ada lost data, operating system error, computer etc. die.

Finally, look for anti virus the most powerful to maintain komputernya.Tapi in fact even make the computer slow and still are exposed to the virus as well.

Anti virus is actually a computer program, which serves to detect the existence of a file / script / treat / etc command which has the potential to damage the data, or system.Dan a tool that is used in an anti-virus virus database.Inilah heart or ability to actually anti-virus ..

So no anti-virus database which can recognize various treat, will not be able to do apa.Makanya need to update the anti virus.dan Update itself there are two kinds,

1.update database, To add to the introduction of anti-virus virus later.

2.Update program, used to update anti-virus capabilities in handling a particular virus.

Now, when asked if anti-virus is the most powerful? I will say, anti-virus that can restore files or file system data, such as before the re-exposed to the virus. But there is like that?!.

According to my experience, there has been no anti-virus such as a FREE itu.Contohnya:

1. PCMAV (pc media anti virus), anti-virus is synthesized (made) by the pcmedia in bonuskan magazine for buyers ini.Anti virus is quite good settingan to restore the system (windows) which has been amended by virus.Seperti Pendekar blank, blue fantasy etc. . But he can not restore the infected file exe virus (Virus infektor).
2. ANSAV (an Anti virus's) Anti-virus RTP is tolerable good, he can recognize the virus as virut and sality, but pengenalannya and sometimes too extreme for its service (ansav guard) sometimes make the computer system bogged down (hang) time booting.Cara press it (Crtl Alt del) select shut down> Logoff, and logon again .. The more he can have a plugin that versatile and durable .. :)
3. Avast, Anti virus technology is sophisticated, he has a VRDB, the function can restore files that a virus, which is at once recognize update.Tidak as other anti-virus will delete files after diupdate.Kekurangannya he has not been good in the restore file ter the infection.
4. NOD 32 Anti virus cleanernya best possible at this time, because I use the stand alone version of its (free) to restore the exe file is infected with the virus.
5. Antivir, may have friends who use a lot of this anti-virus, but I never use belum.Karena friend ribet popupnya with, so I can work effektif ...:).
6. And others, paid or free, and all have less lebihnya as anti virus.

In conclusion, if we use one of the anti-virus, and we want to secure from viruses do:

1.Update virus database ... avast antivir ... ... ... Or the other ...

2.beri input to the vendor (the anti-virus) in a way to send a sample virus, trojan, etc. or Fals alarm (file not detect the virus, as viruses). For material to update anti virusnya ...

3.Cari anti-virus detects the virus more quickly locally, because we are in the Indonesia.Percuma the use of anti-virus does not recognize virus indonesia ...:): P

4. If there is a suspect file, please use Anti Virus Scan Online is the anti-virus to detect it is the best at this time .... :)

Happy learning ...

Nine dangerous virus that attacks the HP / Ponsel

Beware of HP / Ponsel you affected virus that causes damage to the HP / phone. For the case, the more you recognize that kind of name that the virus circulating in the HP / Ponsel. This is the nine virus terganas time this century in the world mobile phone: 1.CABIR
Cabir is the first Symbian virus is the most popular and to this day. Including the type of Cabir worm spreads through the Bluetooth connection to the phone and go through your message inbox with the names that draw attention. If you click it and install it file.sis, Cabir will start looking for new prey Bluetooth mobile phone with access to open, for menginfeksinya.
Cabir is also known by the name SymOS / Cabir.A, EPOC / Cabir.A, Worm.Symbian.Cabir.a, viruses and Caribe. Variannya has been developed to supplement ABC last Cabir.Z. Cabir.Z actually is a variant of Cabir B, only using the name of spreading velasco.sis.
Cabir Bluetooth will enable you to periodic, approximately 15-20 minutes to find prey. No damage to files, which means, only if you are infected phone, the battery will be used as needed to search for other Bluetooth devices.
To prevent this, turn off (disable) the Bluetooth feature you. Activate only when you want to use. And the need to remember is do not install Symbian applications caribe.sis with the name or names of the bizarre.
Next .... to the virus-2 is the music. We see and note ulasannya ... yuk.

2. Postcard
Postcard entrance in a family type of mobile phone virus worm. This virus spreads via MMS, Bluetooth connection, and exchange the memory card with the name beracak (random) xxx.sis.
Type of music manifold. The most general, the music spread via Bluetooth. Some variants can also send MMS to random contacts that are in your Phonebook.
Music not only have one name. The withdrawal criminals, he also has a fictitious name or alias as Postcard [anvir recognized by F-Secure], SymbOS / Postcard [McAfee], SYMBOS_COMWAR [Trend Micro].
When this is the last variant Postcard Postcard T. Postcard Q and Q only menginfeksi Symbian version 8.1 or older. In addition to the sporadic spread, the virus will also open a html page on your mobile phone with the message:
Introduction Surprise! Your phone infected by worms Postcard v3.0. Matrix has you, music inside. No panic please, is it very interesting to have mobile virus at own phone. This worm does not bring any harm to your phone and your significant data. About Postcard wor for Nokia Series 60 provides automatic real-time protection against harmful Anti-Virus content. Postcard is free software and is distributed in the hope that it wil be useful, without warranty Anya. Thank you for using CommWarrior.CommWarrior 2005-2006 by e10d0r.

3. Skulls
Virus is a virus called the skulls SymbOS.skulls or full name. Skulls classified Trojan is a change in the mobile phone system and the icons change to the main menu of the skull image. Initially, this Trojan called Extended theme.sis, but now many will be found with the name skull.sis.
Some type of virus variants have been spread. In the variants skulls.A somehow he does not give effect whatsoever. However skulls.C and H and S, almost all the icon changes to the skull ... ... serem Hiiii.
When installation H variants Skull, bring the notification "Install 'beta'_092_free-sms-RM8" Skull whereas S displays the "Install BlueNum Stealer."
Not only change the icons, skulls are also able to disable applications that icon now been amended. Generally, when we squeeze an application then the icon that appears is a message system eror. Hiiiii ... ... serem banged yah ... ..

4. DOOMBOOT
Although not spreading seganas computer virus, but the damage caused by Doomboot quite serious enough.
SymbOS.Doombot full name. This virus also has a fictitious name, among other Doomboot [F-Secure], SYMBOS_DOOMED [Trend Micro].
When this variant doombot manifold. There Doomboot A, C, L, M, G and P. Doomboot including Trojan virus category. Variant Doomboot.A put and make the files corrupt and danger, after the mobile phone menginfeksi, he will put the other viruses such Commwarrior.B into your phone. The system file is corrupt before the phone can not do podići.
SymbOS.Doomboot.A for example, to penetrate your phone with games like Doom2 installation files that have been dicrack. Usually called Doom_2_wad_cracked_by_DFT_S60_v1.0.sis. While Doomboot C infiltrate the fictitious name "exoVirusStopv 2:13:19", similar to the name of anti-virus mobile phone.
If you receive the file and install it, you will not receive any message after the technical. You also will not think that the phone has been infected because there is no sign of any icons or after the installation process.
Commwarrior.B the diisikan by Doombot to the mobile phone will automatically run and spread through Bluetooth connections. This will result in mobile phone batteries consume excessive, so that the battery runs out quickly.
Parahnya, akan Doomboot create a mobile phone can not do when you are booting off the phone and turn back.
Terlanjur If you do reboot, the only way you can do is do hard reset. Consequently, most of the data that you have saved as images, voice and other data to be lost berbekas not. Very not be pitied?

5. APPDISBLER
Performance AppDisabler actually similar to Doomboot. He will put the files Locknut viruses such as Cabir B and Y in the system to your mobile phone.
AppDisabler also menggandeng skulls and akan A jigger system icons you menajadi picture skull. The more egregious, the virus will stop the performance of the operating system and also some third-party applications. Hiii ... sereeeemmm.

6. CARDTRAP
CardTrap is the first mobile phone virus tries menginfeksi Windows based computer with a virus to put 2 files in the memory card to phone. If the card is connected at any time menginfeksi computer.
Variant CardTrap more bearable. Berhuruf of variants such as single CardTrap P, Q, R, S to beraksara variants ganda sepert CardTrap AA, AG, AJ, and so on.
Usually CardTrap menyaru with the names of the game or application such as KINGKONG, Half Life, Battefield 2 and others. CardTrap Z, for example, menyaru with the name SeleQ 1.7 - CrackedTNT.sis.
CardTrap damage the system is shut off with some of the applications built in Symbian. The virus is also quite capable of sophisticated, so some type of crippling anti-virus. Furthermore, if there is an opportunity to connect to the computer, CardTrap akan trying to plant a virus in Windows-based PC.
Some variants such as CardTrap Z can also turn off the keypad, disarrange applications of third parties, and distribute the files to corrupt the memory card in to the system lead to chaos.

7. LOCKNUT
Locknut or full name SymbOS.Locknut virus is a Trojan that operate using the Symbian S60 system weaknesses. This virus can be classified as critical because the binary file on the system ROM. Locknut eventually can cause the operating system stopped and the phone crashes.
This virus has many fictitious name, among other Locknut [F-Secure], SYMBOS_LOCKNUT [Trend Micro].
Symbian mobile phone which is exposed to this virus has features will show a message or a message as follows:
App. closed
AppArServerTh
Read
In addition, this virus also has a lift to the form alias virus Cabir virus that will follow if the virus is installed Locknut menangkiti your phone. Some variants also terangkai Caribe virus with this virus Locknut.
Locknut E, one of the variants locknut akan damage important files on the Symbian operating system and the applications installed that can not be opened. This effectively makes your phone is locked.

8. PBStealer
Say, PBStealer is one mobile phone virus created by people of Indonesia (made in Indonesia euy,, need to be valued and award the author nih hahahaha).
PBStealer have alias SymbOS / Pbstealer (Symantec), is a Trojan application that correspond to the contact listed in the Phonebook, and then you will save in the form of text files (*. txt).
Glance it is not dangerous. However, the steps undertaken PBStealer selanjutnyalah that you must create alert.
PBStealer next akan txt file to send to another phone via Bluetooth connection. Can not be? If in your contact numbers there are important and used for evil?
PBStealer D, one of the variants PBStealer can also send files and mengkompile contains contact, to do list, notepad and databases at once.
D PBStealer distribute themselves with how to submit 2 application berekstensi SIS file that is ChattingYuk.SIS and PBCompressor.SIS via Bluetooth connection.
Also a great virus PBStealer is prodek home ga ... Oops I feel we now review the latest virus that is RommWar We see and note ulasannya ... yuk.

9. RommWar
SymbOS / Rommwar (by Symantec), including Trojan category. This type of virus akan placed a kind of small programs to target mobile phone. The program will then be able to make the phone experience malfungsi target.
Symptoms aberration function depends on the software version of ROM on your phone. Effects caused by RommWar also vary. Start from the hang, restart the phone itself, to the power button did not work. However, in some cases, these symptoms do not appear and the phone can run as usual.
Virus RommWar this layakanya a Symbian application berekstensi. Sis. His name can be changed various. The application can be very seduce you and make teratarik to install. For example theme.sis, bunga_citra.sis, xxx.sis and others. During the installation process, typically displays a RommWar strange.
Until now, SymbOS / Rommwar has developed has 4 variants, namely:
a. RommWar.A
RommWar.A akan give effect varies, depending on the version of the software ROM available in your phone. Variant is the first mobile phone experience and must hang on the restart again. Shortly after the restart, the phone will hang back. To do so, take advantage of this function RommWar MIME recognizer.
b. RommWar.B
The magic, the two variants RommWar this phone will restart itself and will prevent your phone to do the booting. Is not severe? Is not severe?
c. RommWar.C
Same as version B. This virus will prevent your mobile phone to work!
d. RommWar.D \
This latest variant RommWar cause various effects, the phone can not start a flame until the power button did not work. Interestingly, installation SymbOS / RommWar, sometimes also ditumpangi by the installation of Kaspersky Anti-Virus Mobile is not perfect.

Top 20 virus,This is the dangerous virus in the Month of May 2009

Want to know what virus entry in the top 20 viruses in the month of May terganas ago? Who can have one of the top 20 virus lodged in your PC. In the previous month, there are 20 viruses that are very dangerous and this time there are two new viruses in malware attacks. List of virus-virus terganas is released by one of the leading antivirus company Kaspersky Security Network. Next there are two lists prepared by Kaspersky:

The first list, which is inhabited dangerous programs (Malware), Adware, and unwanted programs are the most commonly detected by the computer user. Virusnya list:

1. Net-Worm.Win32.Kido.ih
2. Virus.Win32.Sality.aa
3. Trojan-Dropper.Win32.Flystud.ko
4. Trojan.Win32.Autoit.ci
5. Trojan.JS.Agent.xy
6. Exploit.HTML.CodeBaseExec
7. Trojan-Downloader.Win32.VB.eql
8. Trojan.Win32.Chifrax.a
9. Virus.Win32.Virut.ce
10. Virus.Win32.Sality.z
11. Worm.Win32.AutoRun.dui
12. Packed.Win32.Krap.b
13. Packed.Win32.Black.a
14. Worm.Win32.Mabezat.b
15. Virus.Win32.Alman.b
16. Packed.Win32.Klone.bj
17. P2P-Worm.Win32.Palevo.ddm
18. Trojan.Win32.Swizzor.a
19. Exploit.JS.Agent.agc
20. Email-Worm.Win32.Brontok.q


No significant changes in the Top 20 in May with the virus Top 20 in April, the only two newcomers in the list, that is, the P2P-Worm.Win32.Palevo.ddm and Trojan.Win32.Swizzor.a.

The spread of P2P-Worm.Win32.Palevo.ddm than the public network through various peer-to-peer, also menginfeksi through storage media, making it easier for distribution. While Trojan.Win32.Swizzor.a utilize some interesting and sophisticated tricks to hide the code, and disguise the presence in the system.

Second list, Kaspersky provides data on which programs most evil menginfeksi objects detected on the user's computer. Virusnya following list:

1. Virus.Win32.Sality.aa
2. Worm.Win32.Mabezat.b
3. Trojan-Clicker.HTML.IFrame.aga
4. Virus.Win32.Virut.ce
5. Net-Worm.Win32.Nimda
6. Virus.Win32.Xorer.du
7. Virus.Win32.Sality.z
8. Virus.Win32.Parite.b
9. Virus.Win32.Alman.b
10. Virus.Win32.Virut.q
11. Net-Worm.Win32.Kido.ih
12. Virus.Win32.Small.l
13. Email-Worm.Win32.Runouce.b
14. Worm.Win32.Fujack.k
15. Virus.Win32.Parite.a
16. Virus.Win32.Virut.n
17. Virus.Win32.Hidrag.a
18. Virus.Win32.Sality.ae
19. Worm.Win32.Otwycal.g
20. Trojan.Win32.Swizzor.a


Seen from this list, Trojan-Clicker.HTML.IFrame.aga, up to rank third, but still below the rank Virus.Win32.Sality.ae. IFrame.aga is one of the many versions of an iframe that is now spread by using Virus.Win32.Virut.ce for menginfeksi to the web page. While Sality.ae is the latest version of the famous Sality virus.

Source: www.detikinet.com

What, you never meet with one of the types of virus-virus?

Kido family's most dangerous, Net-Worm.Win32.Kido.ix

hmmm, its the end of this virus on me as well. One of the family of malware kido. This virus is the actual impact is not too dangerous, the family does not like the others, who menginfeksi svchost.exe. Viruses have distinctive, that is very difficult to be liquidated, even Kaspersky Lab to face difficulties in sndiri. Autorun.inf it can not be haphazard, it is necessary to remove the software sndiri, combofix.exe mengkin prevent one. Hati2 but in practice this software. Note each dy give you warning, because what ... because it will affect the performance of our computer. One device that I attacked my portable hard drive is, he is embedded in the recycler folder, it is very difficult for me to remove it, because there is a recycler in the banyk of data. A little info, the first family kido top risk or the most dangerous activities on the internet. Kaspersky kido put over a month as the most dangerous. Even KK.exe or kidokiller.exe provided by Kasper sendri can not overcome the Net-Worm.Win32.Kido.ix, eits, but Kasper gave a solution in them, try reading the forum, the website "kaspersky.com". Net-Worm.Win32.Kido.ix is dangerous variants with ix as the marker. Kido growing very fast because it can spread through LAN. I have to know more please share ...

New Worm On Yahoo! Messenger will Gosod dangerous Browser

Foster City, California - May 22, 2006 - Experts in the research FaceTime Security Labs ™ identified and reported to the threat of a new worm on the Yahoo Messenger. Facetime scientists confirm the existence of a new worm called yhoo32.explr. This worm will install a web browser by the name of 'Safety Browser' and will put spyware on the PC of the victim. Because Safety Browser uses the same icon with IE, then the victim can easily mengasumsi that it is Internet Explorer. This is the first incidence of a malicious software (malware) to install their own web browser on a PC without user consent. Worm that can reproduce itself is spread through contact list of Yahoo! Messenger on a PC that was infected, how to send a link to the website at the time of the user are in talks messenger. This link will lead to a website that will upload the file to the victim in the PC, and installs Safety Browser. Spam over Instant Messenger link is always known as Spim. According to Tyler Wells, Senior Director of Research at FaceTime Security Labs, "This malware is one of the most bizarre and most dangerous that we met in several years." "This is the first case where a PC web browser hijack without the user's awareness of their own. Some type of browser 'evil' is similar, such as' Yapbrowser 'have been demonstrating the potential for serious damage by directing users to content that is potentially illegal," he added. Description Name: yhoo32.explr Type: Worm and Browserware The target: Yahoo! Messenger Additional Information: Malware akan menginfeksi this PC with two elements. The first element is a web browser called "Safety Browser". Stand-alone application does not have this feature and uninstaller disguise themselves through the Internet Explorer logo. This application is also the home of the hijack Internet Explorer and directing users to the Safety Browser's homepage (demoplanet.tv). This application also play music repeatedly (loop) at the time of the user running Safety Browser. Second element is a worm that can reproduce themselves. Worm reproduce themselves in a way to enter a link in messenger conversations on the infected PC. When users who have been infected with a new conversation and join the conversation that already exists, a link will be inserted at a certain point in the conversation.

Worm Downadup, mem-block sites in Antivirus

In fact since a few days this opportunity to read / get information about the worm Downadup on some blogs about the security / virus / antivirus, but I leave it because the news only dikira normal worm. But the fact that many proclaim about this worm because the worm was "terrible" and sophisticated.

Based on estimates of F-Secure, a new worm variant has been menginfeksi almost 9 million computers in just 4 days time. Amount not less for the long worm that has not appeared.

Original name is Worm Worm: W32/Downadup.gen have different names and aliases, such as: W32/Conficker.worm.gen (Symantec), Mal / Conficker (Sophos), Worm: Win32/Conficker (Microsoft). In addition, also known by the name Conflicker and Kido (example name: Worm: W32/Downadup.gen! A, Net-Worm.Win32.Kido.ih). This category includes Worm Malware running on Windows 32-bit, that is called the W32.
Distribution of worm

The spread of this worm through various ways, such as the Network / network share or on a weak password, can also be spread by creating a file autorun.inf which triggered the copykan to Flashdisk USB (drive) or other removable media. So should the windows autorun feature is turned off to prevent the addition of various other viruses.

world-map

Worm exploit this rift security for Windows menginfeksi victims, like the previous article What's with the Windows Security Update MS08-067. Worm will create a folder with a random name in the directory RECYCLER (the Recycle Bin is used to store the file that was deleted) also duplicate themselves in various other places.
Effect Downadup Worm

And that this may make me write this article, some visitors ebsoft written comments that they can not open the antivirus sites, and may cause this is a worm.

This worm is able to change / add a function of internal windows (TCP) to block access to sites security (security / antivirus), with a filter that has the characters address / text specific. And to eliminate the effect is not easy, because it may be spelled already low level programming level.

Worm is designed to protect themselves from detection by using anti-virus techniques that are used infrequently, protect themselves from the effort to remove, turn off windows update, restore point prior to infection, kill a certain network traffic, to optimize the features of Windows Vista to facilitate the distribution, is able to inject explorer . exe, svchost.exe and services.exe and other.

Sites on the block quite a lot, including the web using the text as follows (in the block can always display the message or Time Out when opening the site):

* Virus
* Spyware
* Malware
* Rootkit
* Defender
* Microsoft
* Symantec
* Norton
McAfee *
* Trendmicro
* Sophos
* Panda
* Etrust
* F-secure
* Kaspersky
* F-Prot
* NOD32
* Eset
* Grisoft
* Avast
* Avira
* Comodo
* Clamav
* Norman
* Pctools
* Rising
* Sunbelt
* Threatexpert
* Wilderssecurity
* Windowsupdate
* AVP
* Avg

It also sites other security.

Greatest TRICKS to Handle VIRUS/ Worm

hmm.,,,hello bro,,
You are have worm / virus that cause none antivirus / removal that you have not cleared? Do not re-format your computer first. Follow the following review .... Emang what tricks the greatest? Clear whether through Safe Mode? Yes, but apparently it only applies to virus / worm abroad. While the virus / worm that can enable smart himself through Safe Mode where the trick is first digawangi by BRONTOK. Followed by virus / worm the other. Then what? What me-rename/menghapus Run-Time Library msvbvm60.dll? Yes, but it is only valid for Malcode created with Visual Basic 6.0 language. While in Indonesia have been scattered many virus / worm is created with the computer language C + + and Delphi. Moreover the Malcode have learned to handle this. Namely with the backup of this msvbvm60.dll, prevent Users work with especial msvbvm60.dll initialization method (the withdrawal when you write in a document, you can not delete or me-renamenya), even with the method of virtual machine that is required by the virus / worm cases such as VB-BLUE Fantasy ERIKIMO up-to-copy msvbvm60.dll with the name of thumbs. db ago the parent file that has been previously oprek-oprek lead to a virtual machine to its thumbs. db which is msvbvm60.dll. So what is? What makes anti / removal to its own. But what fate Normal user can only be basic computer operations course? While the computer is being pro-ria restart once every 10 minutes. So what? Is to make the correct Hard Disk-infected by virus / worm as a slave in another computer. Slave? Period of Hard-Disk disamain want the same girl? That is so. You can remove the Hard-Disk on the infected computer and install the other as an additional Hard-Disk. So the virus / worm that is in the Hard Disk You can not move slightly as the OS that will be used on another Hard Disk. But you must be careful. Do not be so until the computer is infected passenger participate. How simple is that me-msvbvm60.dll temporarily rename the computer in the passenger Malcode if that is in the Hard Disk you created with VB6.0. Then, through a computer virus load is clean / worm that is on your Hard-Disk. The very best way is to delete the file mother. However, the deletion will not be rejected because the file is not berproses parent. Unless you are running it. Could have been unlucky, the computer can be a passenger took digentayangi same virus / worm that is on your Hard Disk. Basic tricks this step can be said as follows: ~ Hard-Disk dislodged the infected virus / worm from your computer. ~ Place in a clean computer from viruses / worms ~ Make sure the computer load the hard-disk to its own. ~ Turn on the computer load. ~ Make sure the Operating System used in the Hard-Disk clean with a virus / worm. ~ Through computer virus clean lodging / Worm on Your Hard-Disk. ~ However, the virus / worm does not akan slightly in the computer load. ~ If you are simply re-install a clean Hard-Disk on your computer. Hey? This means we must have the ability to analyze more in Malcode. Evidence we need to know the existence of the file from the parent virus / worm that is in the Hard-Disk not we? Yes, yes indeed. But this is how the most powerful of the way there. Why? Coba aja. If you are (just example lho ..) Folder Options hidden virus / worm, we can use it. If the folder Windows / System does not work we can open it easily. The point of all activities undertaken by the virus / worm will stop. So we will simplify the cleaning process. Tricks should not be done by a Newbie without guidance from an Advance Users. What can only increase the problem if there is a mistake. So until now I still find the more powerful tricks again. But until now, this trick is still the most powerful.

Crash Sites Download Windows 7 RC

time to download Windows 7 RC (Release Candidate) is opened by Microsoft for the MSDN and TechNet subscribers. Unfortunately, Microsoft again to repeat the error when the offer Windows 7 Public Beta some time ago. Due to the high traffic activity download, Microsoft site also slowed, and eventually crash. During the hour-long customers who tried to enter a disappointment because it can not reach the download page. According to Microsoft spokesman, the problem is caused by the SQL Server database that experienced excessive fragmentation hikes due to high demand. However, when this problem can be surmounted Microsoft.

Final version of Windows 7 in August Finish

Microsoft divulge more prepare to welcome the launch of the operating system teranyarnya Windows 7. Appropriate information from one of the developers team blog says the Windows version RTM (release to market) which is the final version is produced for mid-August. "We hope to complete in three monthly RTM lah," write Brandon LeBlanc, a member of the Windows 7 team blog. However, he stressed that even the RTM version of the settlement will not be done in a hurry to ensure quality. It is well-founded because when Windows Vista was released many of the problems that consumers found. The biggest problem, especially the hardware specs, drivers, applications that do not support, and disrupt the security alert. Windows 7 digadang presence of large-Microsoft can overcome the problems faced in Windows Vista. Even Windows XP can do the migration mulus as Windows 7 features XP Mode so that the application that way in XP is also the way in Windows 7. Previously made, ensure that Microsoft Windows 7 will be available in the market at year-end holidays. One of the partners original equipment manufacturer (OEM) Acer has announced akan even sell notebooks with the Windows 7 start in October.

Mcaffe found the most damage new virus

A new virus has been found, and classified by Microsoft as the most damage! New virus is found on Sunday afternoon ago by McAfee, and have not found a vaccine for mengalahkannya. This destructive virus Sector Zero from the hard disc, a save function of the most important information. The virus is running as follows: "H the virus is automatically sent to all akan name in your address list with the title" A Card For You "(Une carte Pour Vous, atau A Card For You); "H the virtual card is opened, the virus that will freeze the computer so that users must start again, if you hit CTRL + ALT + DEL to restart or command, the virus that will damage the Boot Sector Zero from the hard disk, hard disk so that it will be permanently damaged . According to CNN, the virus is already in a few hours cause panic in New York .. This warning has been received by Microsoft employees themselves. Do not open e-mail with the title "A virtual card for you" (Une carte Virtuelle Pour Vous or A Virtual Card For You). Send this message to all your friends. I think that most people, like myself, prefer to get a warning this 25 times than not at all. CAUTION! Do not accept a contact, "pti_bout_de_ chou@hotmail.com". This virus will format your computer. Send this message to all those who are in your address list. If you do not do this and one of his friends in the list enter your address, your computer will also be affected. URGENTTT !!!!! ATTENTION !!!!! To a friend - all friends, If one day you receive the e-mail with a Powerpoint Presentation titled "Life is beautiful.pps", was opened with a DO NOT for any reason, and delete it immediately. When you open the page file, then you will be on display legible "Now it is too late, your life is nolonger beautiful", then you akan Overall WHETHER LOSS OF DATA, SOFTWARE, PROGRAMS OR ANY like YA NG INSIDE your PC, this jenisvirus and damage the very people who get mengirimkanya akan namaakses, e-mail & password. That was a new type of virus that started on the Saturday night and there is no anti virusnya. The creator of this virus was a hacker who claimed himself as the owner of Life danakan against Microsoft in justice menegakan. Therefore the virus itudatang disguise themselves as pps extension. Source: http://student.logika.ac.id/mod/forum/discuss.php?d=35

Problems Installing Windows XP

Saturday night I experienced a little difficulty when installing Windows XP in the notebook to Lenovo 3000 N200 type. This notebook is the property my office colleagues. Lenovo notebook is already contains Windows Vista (preinstalled), I requested to replace the existing Windows Vista into Windows XP. Problems that arise are the installation of Windows XP system can not recognize the hard drive installed in the notebook. Error messages that appear likely to say that hard disk is protected by the manufacturer (manufacturer) or have incorrect settings. I got an error that the image appears as follows:

Problems occur when the system installation of Windows XP has just begun. This is the second time I have things like this. Some months ago I also had dimintai please Edi by my friend to "remove" Windows Vista in a notebook from the Fujitsu Lifebook S6410 owned Edi my colleagues. The same error message occurs.

Ok back to the first installation of Windows XP on Lenovo earlier. First I try to boot the first Windows Vista already installed in the Lenovo. Because the words "manufacturer-supplied Diagnostic or setup program" on the error message above, the logic says I definitely have another partition on the hard disk in a deliberately hidden and hinder the process of installing Windows. So easy to see how the hard drive partitions, I installed Acronis Disk Director to easily manage the existing partition. With the help of Acronis Disk Director, I see there is a partition size of around 6GB partition other than Windows Vista. I know that it is the partition where the program saves the recovery of Windows (factory default). I just delete the partition, and yet Windows Vista is no longer needed in this notebook. After I delete the partition, I again try to boot Windows XP installation CD. I was the same message still appears, to its hard drive is not recognized: ((

Untung last night I was in a condition fit for ngoprek:-p Soon I asked Google, read the read-while I can enlightenment here. I have to turn off SATA in the BIOS options. I try to search in the search-in the BIOS this is Lenovo. The menu looks like the picture on the following:

I change the option to be the choice Compatibility. Somehow I have a feeling it-so why is the problem. After that I try to run again the installation of Windows XP and in fact the correct steps before the finish. With the option to change SATA controller mode, the current Windows XP can recognize the hard drive and immediately go to the installation (before the menu displays the partition, the system displays the End User Agreement first). The installation of Windows XP itself, as I have described previously here.

Feeling successfully solve the problem on the Lenovo before, so my spirit to prove the theory before the Fujitsu Lifebooknya Edisaya try to run the installation process of Windows XP on Fujitsu-nya Edi. Fujitsu Lifebook Bios menu is slightly different with its Lenovo BIOS. I have to change the AHCI setting in the menu under the "Internal Device Configuration". See the image below:

Had earlier read-read in Wikipedia, AHCI (Advanced Host Controller Interface) is a technology that allows software to communicate with the SATA controller to provide a capability such as hot-plugging and Native Command Queuing. Detail please refer to themselves yes, quite a bit-I ngerti bacanya also be one of the better read you own: D So conclusion is notebook-notebook with Windows Vista the default OS (the average is to use SATA type hard drive) is using technology AHCI . It will be a problem if we want men to be Vista-XP downgrade. So to install Windows XP in a notebook preinstalled Windows Vista, we first need to turn off the feature / option on the AHCI setting-an SATA controller.

Repairing the damage from computer system because virus on Windows


Computers that have been exposed to viruses, malware and the like are usually many features that are not running normal (system / windows were damaged). For example, Task Manager, Run, Command prompt that can not walk, and sometimes to certain files such as EXE, COM and other also can not run.

Such damage usually can be corrected either manually, using the CD or the Windows software with third parties.

If we have a CD master windows, and damage is quite severe, usually can still be solved using the Repair feature (read: me-How to repair (repair) Installasi Windows XP)

This time will be discussed how to improve the system that is broken windows caused by the malware, viruses and the like or for other programs with the System Repair Engineer (SREng).
System Repair Engineer (SREng)

System Repair Engineer (SREng) is a small program (less than 2 MB), portable and free (free) in the KZTechs.COM developed by the webmaster, Smallfrogs (Microsoft has been getting awards Most valuable Professional (MVP) for Windows Shell - in China from 2004-2008). This program is intended to detect common system problems and damage the public are often caused by computer viruses.



To the level of experts (advance), this program can be used to detect and fix problems themselves. While for regular users (general public), there is a Smart Scan function to check the computer and the report (the report) so that can be stored for further analysis and the review by the more expert.

Nevertheless, there are various features that can be used directly even though by most computer users. Here some explanation of the features and functions that we can take advantage of.
Boot Items

Display a list of programs or applications are automatically run when windows booting, both from the registry (including hidden items, and other UserInit), Folders, Scheduled Task, Services and Boot.ini. If you notice a strange program (suspicious), then we can stop with aktifkannya way to check it.



Once removed the check, then click the Refresh button, to ensure that the conversion has been saved. If the check appears, or return a new list appears with the name of the other, is a strong indication that the computer is being infected with viruses or other malware (preferably computer / hard drive in well with the scan Bootable CD, portable virus scanner, or transfer Hardisk on another computer and scanned from there).
System Repair

sreng-system-repair

In this menu there are several separate functions, which are:

File Association

Display the extension status of general files such as. TXT,. EXE,. COM,. PIF,. Reg. BAT,. SCR,. CHM,. Vbs and other. If the status does not indicate "Normal" or we can not run the file with one extension, then we can fix by selecting the file extension is problematic, and click Repair.

Windows Shell / IE

In this section, we will see a list of list-windows settings (settings) that are usually modified / damaged by the virus, such as:

* Menu Start / Run is not active
* Registry Editor (regedit.exe) can not be opened
* Command Prompt, wallpaper, Control Panel can not be accessed.
* Drive in My Computer does not appear
* Log off button does not appear
* Menu "File" in Windows Explorer does not appear
* Icon on the desktop does not appear
* Folder Options can not be activated
* Key search (search) does not appear
* Windows Explorer or the system tray can not be in the right-click
* To display the hidden files (Hidden files)
* Many of the view menu in Internet Explorer that does not appear
* Various other settings

To improve the above settings, select from the list and click Repair.

Browser Add-ons

Display a list of plugins / add-ons (additional features) that are running the web browser used. We can see the detail information, hide or remove the add-on that is not desired.

Hosts file

Hosts file is a list of host name and IP address mapping. For example there is a line as follows:

127.0.0.1 localhost

Means that when we type localhost in the web browser will be mapped to the IP address 127.0.0.1. For more information can see http://support.microsoft.com/?id=108295

This file can be changed by spyware or malware so that when writing the web address is actually assigned to a specific IP address that is not true.

Winsock Provider

Will display a list of Windows Sockets API (Winsock), which handles network access, especially TCP / IP.

In this menu there are features of "All Reset to default values", which can be used if an internet connection can not be run as before (problems) or when all of a sudden we can not browse, email or other network operations, and an internet connection to run normally.

But when the network connection is running well and we can browse, send email or do other network operations, not recommended for the Reset. Read more about Winsock

Advanced Repair

There are two settings in this menu, the Recommended Level Fix and Fix Powerful Level. There is also the key for me-Reset Winsock, memperbaki Safe Mode and Scan To Hook API (advanced).
Smart Scan

Smart scan will scan the computer to generate reports in detail about the computer system which can be used by people more qualified to review and address computer problems.


Extensions

SREng supports additional features that can be added separately (can also create additional / plugins themselves). On the page Download SREng included some plugins such as:

* NTFS Stream Scanner, to check the NTFS format of the data is dangerous
* Windows Shell Menu Manager, to set the menu, such as windows shell menu when right-click the desktop and the other.
* File Figital Sign Verify, understand and verify a digital signature file.
* Network Activity Monitor, to monitor activity / status of the network and provides detailed information about the connection.



One thing that might be a bit less is not the help files (manual) in English, the language in China and discuss itupun still version 2.5. Apart from that, this program is very useful and can be run on the operating system: Windows 98SE, ME, 2000, XP 32bit, Server 2003 32bit, Vista 32bit, Server 2008 32bit.

Free Avira anti virus premium + license 2014


Avira is one of the anti-virus do well enough, so I give avira anti virus is the latest to you for FREE.
Avira that i give you, this is Avira Premium do with Expired License in the year 2014.

On the site authorized Avira premium with this with price Euro 19.95, for 1 PC for 1 year. But here I give a free - free for FREE and FREE for 5 years.

In the latest Avira Premium has a few functions do not a lot of aliases, including:

- AntiVir keep your computer from virus attacks, Trojan and Worm
- AntiRootkit keep your computer from hidden Rootkit I
- AntiPhishing keep your computer from phishing
- Antispyware keep your computer from spyware and adware
- Faster Scanning up to faster 20% of other Anti-Virus
- WebGuard keep your computer from the website you suspicious
- AntiDrive halt activity-by download malware impromptu surfing at the time
- RescueSystem create a bootable rescue CD

For more information please visit the authorized website.

you may choose this link :
avira premium software
license 2014

Registry Corruption After installation of Windows XP SP3

Symantec Corp. to remind all consumers that use security products such as Norton Internet Security, Norton AntiVirus, and Norton 360, that before the installation of Windows XP Service Pack 3, have to do to disable the feature SymProtect to avoid the risk of a loss of some data on the computer system. SymProtect, a feature technology designed to protect the security software from malware. Symantec found evidence that when XP SP3 installation, there was the addition of a false key in the number of registers in the register a lot of Windows users.

In a few hours after Microsoft launched Windows XP SP3, many users do complain about the content of Device Manager and ending the free Internet connection or wireless network. Then the user find the content of the register in which so many false and all the data therein berawalan character ""$%&".

Symantec refused to register the case that this error. In the last week, Symantec accuse Microsoft file named fixccs.ex, part of the XP SP3 package, which has produced key inputs to the register so that the slump in the user register. Symantec but eventually realized that the error that caused computer system this problem occurred from a combination of file fixccs.exe and SymProtect that Symantec has said that the file will add fxccs.exe register key processes occur during SP2 update and then delete the key is added, while SymProtect work to prevent the removal of a key is added fixccs.exe because it will change the register keys in the existing register. Symantec has been providing instruction to turn off all the different variations SymProtect title in Norton.

Development of Computer Virus Origin

The virus first appeared in the world called [Elk Cloner] was born about 1981 in TEXAS A & M. Spread through Apple II floppy disks that have operating systemnya. The destroyer mendisplay this message on the screen: "It will get on all your disks, It will infiltrate your chips-yes it is Cloner!-It will stick to you like glue-It will modify RAM too-send in the Cloner!" Hi ... ... ... ... ... ....

The name "virus" that sendiiri new diberkan birth after 2 years by Len Adleman on 3 November 1983 in a seminar on how to create a ngebahas virus and protect themselves from viruses. But those orangorang often assume that the virus first appeared is a virus [Brain] that was born in 1986. Reasonable aja, soalnya virus is the most appalling and most extensive distribution karean crawling through a DOS diskette that time again ngetrend. Also coincides with the birth of [PC-Write Trojan] and [Vindent]

Start at that time, `the world the virus starts. Development of chilling and sangar! intermittent one-year virus first appeared menginfeksi file. Usually the attack is the file *. exe berekstensi the virus is called [suriv] included in the virus "Jerusalem". Speed distribution is' throb 'to that time. But this virus ngga 'too bad ko' soalnya virus disciplines and slam its IBM Mainframe real 'old-old, just one year (the year that long eh what a ya ...?)

1988, BIG attacks appear to Machintosh by the virus [MacMag] and [scores] and the Internet network dihajar completely artificial virus by Robert Morris. In 1989 there are fraudulent people who ngirim file "AIDS information program", and Unfortunately, once this file is opened, which is not obtained information about AIDS, but the virus mengenskrypsi hard drive and charge for the code pembukanya (hehehe ... ... .. there is no-way aja What the money)

Since that time, the spread of the virus is real 'keitung again. However, the impact that caused it 'is too large. New in 1995 appears a large-scale attacks. I 'half-hearted, they nyerang large companies, among Griffith Air Force Base, Korean Atomic Research Institute, NASA, IBM and many other giant COMPANY persecuted by the "Liberation INETRNET FRONT" on the day of Thanksgiving ~ ~. Because of the courage and fury attack, 1995 dijuluki year as the Hacker and cracker.

The cracker is never satisfied. Each operating system appears or a new program, they are ready with the new virus. You often ngetik with MS Word may have nemuin virus Titassic. This virus local native Indonesia lho ... and unique, the virus ngingetin we make this prayer on time (waduh, I also learned ..) But do not wrong, macro viruses that have the title [concept] can also be evil, and vicious sangar banget . What is learned that this evil is potential ngemusnahin 80% of data files and program the victim.

Now, along with the development of technology, the virus first appeared mengkombinasi a macro virus and worm. His name is sweet [Melissa]. But it 'semanis name, this potential virus spread to other people via E-Mail and the most painful, it is potential nyebar to all e-mail address on your address book. And at this time millions of viruses that appear bergentayangan ngga 'known in the Internet.

Be careful with new handphone virus 2009

Here is the news about the latest virus news for cat owners mobile phone. This is not a virus attacks the computer, but the mobile phone. How it works like a computer virus. This virus came from Europe and start sdh attack the United States and Asia (June news - InfoMedia edition July 2001), sdh now go to Indonesia.How it works: 1. Akan your handphone rings and name appeared on the screen, among others: XXX, YYY, OOO, 123 2. When you receive a code on the mobile phone screen as such, should not be appointed / accepted, let alone to die deringnya own.3. After the "missed call" check-in call daftaf register your phone, you will get the letters XXX, YYY, OOO, 123. Tampa without the name and other identity.4. Back to the main menu of your phone screen. 5. Try again call-register/missed to call you. 6. Odd number is not lost ..... weird ..! If you receive such things do, it means that someone is being tried to send a virus in your phone. Motif: generally the perpetrators chose victims at random, can the people in their own country or can also from abroad. They usually get your phone number, when you enter the phone number via the internet for making a registration or e-mail confirmation of payment. after the success of the virus to enter in your phone, the virus will send the data identity, No SIMCARD and your PIN (if you are post-pay subscribers GSM) and Personal Identification Number and No SIMCARD you (if your GSM prepaid customers). of data can do it, that person can use your credit from long-distance and use your identity for the things you bad. So that you will suddenly run out of credit or slowly (because your credit is used simultaneously with the perpetrator).How the virus: 1. Successful virus entry, it will immediately attack your simcard and send you useful information for the perpetrator. 2. Virus will soon deplete your balance. 3. The virus will move to the HP software in your 4. Virus akan settle and hold bercokol in your HP Software, so if you think akan SIMCARD for change, with the virus will immediately attack you SIMCARD new.5. After a certain time Virus akan bust your software, and HP ......... Tamatlah history you will not be used again and fix it.6. Gawatnya, if your phone is linked page on the computer / modem, then the page akan virus attack your computer. Heartland already infecting: Surabaya and Bandung Perhaps the only accecories Can you use only Casing and Bateray. Hopefully this information is useful for them and I have the HP for their playful SMS.Original Source Intra media Malaya, Malaya design group

i hope it will help you to get information about virus