Tuesday, June 29, 2010

How to Uninstall Antivirus 7

About Antivirus 7
Antivirus 7 is a fake rogue security application that can be installed through the use of a Trojan horse parasite. Usually Trojans that install programs such as Antivirus 7 come from other malicious applications that are downloaded from P2P networks or warezprogram pirating web sites.

What Antivirus 7 do?
After the installation of Antivirus 7, a computer user is prompted with virtually endless amounts of popup alerts that falsely warn them of parasite infections. This software will also attempt to scan the system that it is installed on to reveal several fabricated parasite results. These tactics are carried out as part of a scare tactic to force users into purchasing the full Antivirus 7 application.

Removal of Antivirus 7

Getting rid of a software application like this may require an expert computer user if performed manually. Manual removal of Antivirus 7 can be performed but it could put the system at risk of deleting an essential system file needed for Windows to load. Removing registry entries associated with a harmful application can also seriously affect the way the system operates and could render certain functions useless if the wrong entry is deleted.

Monday, June 21, 2010

Spyware Adware Malware-A Real Problem


Most computer users have heard about adware, malware, and spyware. However, many are not sure how these can affect their computers, and here is where the problem lies. If your home is being threatened by potential thieves, would you not do all you can to protect your property and your family?

In a very similar way your computer is vulnerable because of the growing number of victims of identity theft and botnet. These threats can also cause your system to crash, and that can cost a pretty penny.

Spyware has the distinct advantage of being able to worm its way into your PC through downloads, emails, or internet surfing. Once inside your computer, it can track down your computer use, internet activities, disrupt your PC use with pop-ups, and steal personal and financial information like your credit card numbers.

With botnet a computer spyware program, it can turn your PC into part of its network which sends out spam without you knowing it and so you end up infecting and spamming your relatives, business associates and friends, without even knowing it.

You need to beef up your security, and one of the best ways to do it is with an anti-spyware that will not just protect you once, but continuously through automatic updates and scans.

Sunday, June 13, 2010

Facebook's New Privacy for Users


From long time, Facebook has had a pretty consistent modus operandi that It breaks stuff, catches flack for it, and then-eventually-backpedals or otherwise responds to the criticism. The tradition continues with CEO of Facebook Mark Zuckerberg's new blog post. After a few weeks of intense unhappiness over the company's recent new features and related changes to privacy policies, it's redoing its privacy settings in a major way.

Zuckerberg says that the new features will take a few weeks to reach every Facebook user. I don't see them yet. But here's a recap of what he says is new:
• Rather than having to wade through gazillions of granular settings, it'll be easy to tell Facebook you want anything you post to be visible to friends only, friends of friends, or everybody. These rules will apply to future Facebook functionality that doesn't exist yet.
• You'll be able to make your Friends and Pages lists completely private.
• It'll be easier to block apps on Facebook from getting at your information.
• It'll be easier to block external sites such as Pandora which use Facebook's new "Instant Personalization" from getting at your information. (Currently there's no single place to go to do this, nor any way to block all sites with one click).
• If users find these changes satisfactory, Facebook intends to avoid major changes to privacy policies "for a long time”.

Monday, June 7, 2010

Adobe warns over unpatched PDF peril


Hackers are making use of critical, unpatched vulnerabilities in Adobe Reader, Acrobat and Flash Player.

These vulnerabilities are platform independent and can affect users of Adobe products regardless of whether they run Windows, Mac or Linux systems, Adobe warns.

The software developer reckons that Adobe Reader and Acrobat version 8.x are not vulnerable, but users of the newer version 9.0 of the software are at risk. Adobe has published a workaround involving the deletion of a library file connected with processing Flash content in PDF files pending the development of a more comprehensive fix.

Adobe is yet to publish a timetable of when patches will become available. Adobe Flash Player 10.0.45.2 and earlier versions are vulnerable to the bug. Users of Flash Player 10.1 Release Candidate may be in the clear but that's uncertain, as an advisory from Adobe explains.

The bugs are the latest in a series of security pratfalls to befall Adobe software, joint favorite with Microsoft's browser and programs as the main targets of hacker attacks. The latest flaw can be blamed on the support of exotic files and formats within PDF files, a problem that has cropped up in the past.

Tuesday, June 1, 2010

Removing Anti Virus Armor Rogue Anti-Spyware


Anti Virus Armor also known as Anti-Virus Armor 2010 is a rogue anti-spyware application designed to pilfer money from computer users. Once active on the infected computer, Anti Virus Armor pretends to scan your system and display some imaginary threats.

Steps to remove Anti Virus Armor Rogue Anti-Spyware:

1. Restart your computer and keep pressing F8 Key before Windows launches. Use the arrow keys to select the “Safe Mode with Networking” option, and then hit ENTER Key to continue.
2. Download Spyware Cease install it and update its database to the latest. After that, restart your computer so as to make Spyware Cease fully functional. Repeat Step 1 into Safe Mode and run an Online Scan of your computer so that Spyware Cease can detect all potential malware in your system.
3. After the Online Scan finishes, click “Details” for the malware detected to make sure that your important data are not infected and removed. Ignore or select the scan result and click “Remove” to remove the threats. Reboot your computer and let Spyware Cease delete all detected virus.
4. Download and install RegTweaker to repair your corrupted registry.

To make your computer run as perfectly as before or much faster than before:

1. Download and install RegTweaker.
2. Run a full scan of your registry.
3. Click “Repair Problems” and repair all errors detected.