Sunday, August 30, 2009

What Is Virtumonde

What is Virtumonde?

Dear Friends,

In our earlier posting we discussed about Fake Antivirus and it may be in case of Spyware i.e.: Fake Anti-Spyware but now we are going to discuss you who is the villain behind all these. We think now you have understood what its name is, yes it is Virtumonde. So let us make you clear what Virtumonde is? This is a Trojan which came in the world of internet I the year 2004 for playing a dangerous game with us i.e.: netizens.

What do they do?

If they are installed they come in the form of pop up by showing that your computer is infected and u need to scan it by a particular anti-virus or anti-spyware and the said pop-up will also come on your screen when you are offline and not only that they disable your automatic system update and the function of your original antivirus. Do you know if you are infected by this Trojan they don’t allow your browser to surf those sites which guides you to remove this Trojan, disable the registry editor, msconfig, task manager, Firewall? So we think now you have understood how danger this is.

Its Removal.

It is tough to remove this Trojan from computer if once infected but you can get help or try by reading the guidelines of www.bleepingcomputer.com but we are not sure about this when one of our friend’s computer was infected we advised him to format the computer after taking a backup of some important files and he did so. But mind it if your anti-virus is updated they will alert you that your system is infected with vundo or Virtumonde Trojan.

So friends take care keep on touch with us for some more cyber crime prevention awareness which you don’t know.

With Thanks

Urproblemmysolution team

Friday, August 28, 2009

Fake Antivirus


Fake Anti virus

Dear friends,

We think most of we love our PC or Laptop and for that we always want to keep our computer clean from all kinds of dangers and for that all the experts say that we should use Antivirus. So we think all of we know what is antivirus and what it does for our computer and as we all are afraid of virus both in human and computer life we always keep our self from viruses. For this two types of men in the world are running their business. One of them want to do good for us and the other person pretends to do good for us but actually they do nothing for us rather they causes harm to our both in economical and living age.

So now we thing you have guessed what we are going to say. Yes it is like fake medicine which does not work in your body but can cause harm to you and it happens to their life who are trapped by the dishonest businessman. So fake antivirus is that antivirus which comes to you in disguise of antivirus but work nothing for you installing Trojan, Spyware and Adware to your machine.

When you will understand its presence, what are the dangers and what to do?

When you see that a pop up is blinking in your screen that your machine/computer is infected by ………..viruses and for removing this virus you will have to install that particular antivirus as no other antivirus can remove this. Don’t be tensed just use your original updated antivirus and scan your machine and do nothing for that fake antivirus even don’t click on them

You see a pop up is blinking and asking you like “do you want to free scan your machine from viruses?”. Don’t do this as if you do that they will show you so many viruses had already been installed in your machine and the message like earlier noted and not only that if you do that they will install some viruses in our machine and for that you will have to either purchase their product or formatting your machine and during purchasing you will have to give them your credit card number which will be misused by them .

So when you get this type of message don’t get nervous just avoid them and don’t show your interest on them but by mistake if you click on them there is every possibility to install virus or Trojan or spyware or adware in your computer. So always keep your computer scanning regularly and update it regularly. Computer experts says this type of anti-viruses as “rogue antivirus” and this is the system the dishonest cyber businessmen and cyber criminals are applying this in the cyber world. So be cautious.


With thanks

Urproblemmysolution Team


Wednesday, August 26, 2009

Some steps to save your computer

Dear Friends,

After long interval again here are some tips for you for keeping your computers safe from hackers/crackers which is given to us by one of our readers for the sake of all netizens who has to visit internet for their works.


1. Install Anti-Virus Software - This should not even have to be listed, if you don’t have anti-virus software installed, you’re asking for trouble! And if your reason for not installing anti-virus software is because it’s too expensive, then that can reason can be shot down because there are several free anti-virus programs out there that are considered better than commercial software packages

2. Update All Software - Installing an anti-virus program by itself is not enough. There are hundreds of new threats that are found daily and the anti-virus programs release updates regularly to combat the new threats. Make sure you anti-virus program is set to update automatically so that you don’t have to rely on your memory to do it. Also, this goes for all the software on your computer. The most important software to keep up to date is your Windows operating system. It is essential to have Automatic Updates turned on and set to download and install updates automatically.

3. Install only Trusted Software - If you’re not sure what a piece of software does from it’s name, then don’t install it. Also, don’t install anything you didn’t intend to install in the first place. Sometimes programs will ask you to install other programs during the install of the first application. Be careful of that because it’s usually spyware. Install software from big names sites only, such as Microsoft or Adobe.

4. Avoid P2P File Sharing Software – If used with great caution, P2P software is quite useful for movies, songs and software, but if you’re not very technically savvy, you might end up downloading a song that has a keystroke logger attached to it that will send anything you type to some other computer over the Internet. It’s almost impossible to tell that this is occurring unless your anti-virus or anti-spyware programs pick it up in their scans.

5. Delete Unknown Emails – If you receive emails from random people’s names, do not bother to open the email, just delete it. If you have any doubts after reading the name and the subject, it’s probably not someone you know. Never download or open attachments unless you are sure it’s from someone you know. Give the person a call quickly and ask them if you’re not sure. Most large companies that you create online accounts with will not send you attachments unless you specifically ask for them through their web site. Also, be wary of any emails from sites pretending to be banks, auction sites, etc asking for you to verify bank account info or address info. No bank ever does that.

6. Do not click on Ads - Avoid clicking on ads if you can. Especially those ads where something is flying around and if you shoot the duck, you win some prize! Ads have become more sophisticated in that they try to make the ad interactive so that you’ll be tempted to play it like a game.

7. Run Virus Scans Regularly – If you’re not in the mood to scan every day, at least run a scan once a week. Actually, setup a schedule for your computer in your anti-virus software to run a scan late at night or whenever you don’t use your computer and that way you won’t be bothered with a slow computer.

8. Be careful what you attach to your computer – This is a more common way to transfer viruses than you might think. Everyone now has a USB flash stick that they carry around on their key chains, ready to snap into any computer. But who knows what your viruses are on your friends computers and what accidentally got transferred to their USB stick. A lot of virus programs will auto launch right when the USB stick is put into the computer, so you don’t even have to open or download any of the files to be infected.

9. Avoid Shady Web Sites – If you need to look at porn, then make sure you do it in a virtual environment. You are DEFINITELY going to get some virus or spyware if you browse porn sites on your computer. Virtualization basically allows you to run programs like Internet Explorer in a virtual environment that does not effect your current operating system. If you want to find out more, search for “Virtual PC” or “VM Ware” in Google. Otherwise, simply avoid going to shady web sites!

10. Turn On or Install a Firewall - If you’re running Windows XP, make sure Windows Firewall is turned on. A firewall prevents hackers from gaining access to your computer by limiting the number of ports that are open to the public. Also, when buying a wireless router, make sure it has a built in firewall. Having a software and hardware firewall is better than just having one or the other.

11. Secure Your Wireless Network – Most wireless routers are set to no security when you install them. Be sure to log into the router and at least set the basic security that requires a password. There are stronger encryption options, but if you don’t understand those, then simply set a password on the router, otherwise anyone can connect to your home network and access everything.

12. Use a Complex Password for Login – This means that you should already have a password to login to your computer. Not having a password at all is not a good idea. Create a password for all user accounts and make sure it’s complex. Complex means it should have numbers, upper case characters, lower case characters, and symbols. This makes it way more difficult for a hacker to get into your computer.


With Thanks

Urproblemmysolution team

Tuesday, August 18, 2009

How to restore Hijacked Browser By Microsoft.Com



How to restore a hijacked browser


Dear Friends,
Now we will give the tips for restore the hijacked Browser which is published in microsoft.com.So friends now pl read it and take its help if youe Browser is hijacked.

The following six tips can help restore your browser's settings:

1.

Stop cascading pop-up windows.

If endless pop-up windows appear on your screen, you'll probably want to stop the deluge first. To do this in Microsoft Windows Vista, Windows XP, or Windows 2000 while using Internet Explorer:

1.

Press CTRL+ALT+DEL, click Task Manager, and then click the Processes tab.

2.

Click IEXPLORE.EXE, and then click the End Process button.

This closes all instances of Internet Explorer. Then you can re-open the program to continue browsing as usual. To help prevent future attacks, you should also have a pop-up blocker turned on. To turn on the pop-up blocker in Internet Explorer 7:

1.

Click Tools menu, click Internet Options, and then click the Privacy tab.

2.

In the Pop-up Blocker box, select the Block pop-ups check box. Click OK.

If you still experience the other effects of a hijacked Web browser, try the following:

2.

Install preventive software such as the kinds mentioned in the preceding Preventing browser hijacks section. Many browser hijacking programs can be identified and removed by downloading, installing, and running these programs.

3.

Run the Malicious Software Removal Tool. This can catch some, but not all, kinds of hijacking software.

4.

Reset Internet Explorer settings. If you're using Internet Explorer and your home page has been changed, you can often reset it yourself.

Close any Internet Explorer or Windows Explorer windows that are currently open.

Open Internet Explorer.

Click Tools, and then click Internet Options.

Click the Advanced tab, and then click Reset.

In the Reset Internet Explorer Settings dialog box, click Reset.

When Internet Explorer finishes restoring the settings, click Close, and then click OK.

Close Internet Explorer.

5.

Disable add-ons. Many browser hijackings come from add-ons, also known as ActiveX controls, browser extensions, browser helper objects, or toolbars. These items can improve your experience on a Web site by providing multimedia or interactive content, such as animations. However, some add-ons can cause your computer to stop responding or display content that you don't want, such as pop-up ads.

To learn how to disable add-ons in Windows Vista or Windows XP Service Pack 2 (SP2), read How do browser add-ons affect my computer?

6.

Removing unwanted programs with the Add/Remove feature. If you're ready to try some advanced removal methods, the Microsoft Help and Support article Unexplained computer behavior may be caused by deceptive software provides additional steps you can take, including how to use the Add/Remove feature, the built-in program remover, and the program finder in Windows Explorer.

7.

Empty the Recycle Bin. When you've finished these steps, especially if you've removed an unwanted program. Then restart your computer.


With Thanks

Urproblemmysolution Team


Sunday, August 16, 2009

What is Browser Hijacking



What is Browser Hijacking

Dear Friends,

Today we will discuss about Browser Hijacking and its details. So we think before discussing Browser Hijacking you must know some definitions which will help you to understand this easily and we think if the netizens know this they will realize if this thing happens to them as now a days due to the strong anti viruses the cyber criminals are using this method to get the data of netizens during net surfing for exploiting them.

So Let’s start our discussion with the definitions:-

Browser: - What is Browser? It is we think known to all. It is an application program that provides a way to look at and interact with all the information on the World Wide Web. So web browser is a client program that uses HTTP (Hypertext Transfer Protocol) to make requests of Web servers throughout the Internet on behalf of the browser user.

Plug-in:- What is Plug-in? Plug-in applications are programs that can easily be installed and used as part of your Web browser. They are called helper applications and run as run as a separate application and require that a second window be opened. They add additional software to your computer when web page is accessed.

Active X: - What is Active X? ActiveX is a set of object-oriented programming (OOP) technologies and tools that Microsoft developed for Internet Explorer to facilitate rich media playback. ActiveX is Microsoft's technology for signing plug-ins.

Computer Parasites: - What is this? Computer parasites are unsolicited malicious programs, which are installed to the system without user knowledge and consent. Most of these threats silently run in background, so you can't notice them. If you have running suspicious processes, strange toolbars in your web browser, changed system settings, undesirable pop-ups or your system runs too slowly and unstably, then there is a huge possibility that your computer is infected with some parasites. Parasites affect mostly Microsoft Internet Explorer web browser.

And now we will come to our main point that is to make you understand clearly what Browser Hijacking is. We think we need not tell you what is hijacking as even the children of today know the term hijacking from the televisions and films. So we think you have already guessed what Browser Hijacking is. Suppose you wanted to go to London but but but you were forced to go to Lahore by the ………………….So who are they? Are they friends or foe? Definitely they are foe and they are criminals yes they are Hijackers. In the same way you opened your browser for visiting Google and your browser is opening page for Alkaida or Pornography. What is this? This is Browser hijacking.

What cyber world says about Browser Hijacking is that it is a malicious program, usually a web browser plug-in that modifies web browser settings in order to change default home, search or error page and redirect a user to undesirable Internet sites. The most generally accepted description for browser hijacking software is external code that changes your Internet Explorer settings. Generally your home page will be changed and new favorites will be added. Most browser hijackers take advantage of Internet Explorer's ability to run ActiveX scripts straight from a web page. Generally, these programs will request permission to install them via a popup that loads when you visit a certain site. If you accidentally give them permission to install, IE will execute the program on your computer, changing your settings. Others may use security holes within Internet Explorer to install themselves automatically without any user interaction at all. Worse, these can be launched from popup ad windows which the user has not even intended to view. (Source www.2-spyware.com)

With Thanks


Urproblemmysolution Team



How To Feel Browser Hijacker In Your Computer


How To Feel Existance Of Browser Hijacker In Your Computer


Dear Friends,

We have learnt so far what Browser hijacker is and we will learn what they do in our computer. How we will fill that we have been attacked by Browser Hijacker.

- Changes web browser’s default home page to a particular web site without asking for user permission.

- Changes web browser’s default search page to a predetermined web site without user consent.

- Sets own error page instead of web browser’s default one, which is displayed when the entered web site address is not valid.

- Redirects a web browser to a predefined site whenever the user enters invalid address or performs an Internet search.

- Modifies essential web browser settings, decreases default security level and adds undesirable or insecure resources to the trusted sites list.

- Creates numerous links to advertising pages, places desktop shortcuts to marketing sites, adds multiple bookmarks to the web browser’s Favorites list.

-A seemingly endless barrage of ads pops up on your screen.

-New toolbars or Favorites are installed that give you icons and links to Web pages that you don't want.

-Your computer runs sluggishly. Malicious software can slow down your computer.

With Thanks

Urproblemmysolution Team

How Browser Hijacker Comes to you



How Browser Hijacker Comes To You

Dear Friends,

Now we will tell you how they come to your computer as this will help us to stay away from installing Browser hijacking programs in our computer

1. Usually browser hijackers are installed by unsafe freeware, shareware or advertising-supported programs such as various browser add-ons or toolbars. Even some reputable products’s Instant Messenger can change default web browser settings. Uninstalling the host application in most cases doesn’t remove bundled parasite.

2. Lots of spyware and adware parasites have integrated browser hijackers that get silently installed during the host parasite’s installation process. Removing a particular spyware or adware doesn’t affect a browser hijacker.

3. Some widely spread browser hijackers get into the system using Internet Explorer ActiveX controls or exploiting certain web browser vulnerabilities. Their authors run insecure web sites (mostly with pornographic or illegal advertising content) filled with malicious code or distribute unsafe advertising pop-ups. Whenever a user visits such a site or clicks on such a pop-up, harmful scripts instantly install a parasite. A user cannot notice anything suspicious, as browser hijackers do not display any setup wizards, dialogs or warnings.

It is known that some browser hijackers are dropped by specific viruses, worms or Trojans.

So dear readers now you have realized that if you don’t do this you are safe from Browser hijacking.(Source www.2-spyware.com)

With Thanks

Urproblemmysolution Team

.


Thursday, August 13, 2009

For The Help of Police Officers

Police Officers Take a Note Please

Hi friends,
We posted here earlier about the hacking of Pay Pal Account and how to remain safe from that and now we are going to post a very useful comment of one of our reader, who is now in CBI. We think we need not to introduce you what is CBI. So please everybody read it and know that you are secured from cyber criminals who hack your Pay Pal Account as they may be caught with the help of Pay Pal by the police. And here is the Valuable command of Mr. Sanjoy Goutam of CBI India:-

Blogger Gautam said...

PayPal is pleased to collaborate with the Government judicial authorities for repression of crimes committed by or to the detriment of their users.

Requests for information from law enforcement and the orders of
acquisitions data the court should be directed to PayPal (Europe)
s.àr.l. et Cie S.C.A, 5th Floor 22-24 Boulevard Royal L-2449. These
can be sent to the Fraud Investigation Team

Requests for information by the police include:

• Send by fax on letterhead of the applicant
• Sign in charge of the investigation
• Direct to PayPal (Europe) s.àr.l. et Cie S.C.A.
Each request for information should include the following information:

• The e-mail address.
• All addresses and telephone numbers of the person you investigated.
• Your name, address, department, telephone and fax.
• Specific details about the information you need and how they are
needed for your investigation
*** Please note that PayPal has more than 70 million users and thus
more details
you provide will be more easy for us to identify the information you
have requested ***

PayPal (Europe) Ltd is an institution for the issuance of electronic
money regulated by the Financial Services Authority of the United
Kingdom and must abide by the Data Protection Act in accordance with
the laws. Therefore, for the release of financial details or
information on transactions carried out by our members, you must order
expressed by the court.


So many many thanks to Mr. Sanjoy Goutam from the heart of Urproblemmysolution Team.

What is File Binding

What is File Binding

Dear Friends,

Now we will tell you that dangerous thing of internet and computer science which is enough to damage your dear computer by coming to your computer home as your invitee and now you have started your guess what it is. We will not keep you in suspense and so now we will tell you what it is and why we are discussing about this. But friends we are discussing about this for informing you how danger it is. Do you know paper filing? We thing most of you know this as this is part and parcel of official work and our personal job. When we keep different papers in a file in a office and then bind it or we can keep the papers serially in a file and bind it its called file binding in our regular life. And same activity is done by the cyber criminals when they use this conception to hack or damage your computer. Now lets explain it to you in a easy way so that you can understand and keep yourself aware from this danger.

Two or more file bind together in a single file is called file binding. Lets take an example. Suppose you have downloaded a picture from Internet. You double click on it to view the picture. As you double click on the picture, it will open in your default picture viewer and an executable file starts running in background silently. That may be a virus, worm, spy ware and add ware or Trojan.

That’s mean picture. jpg + virus. exe = picture1.jpeg or it may be game.exe + virus.exe = fungame.exe

File binding can be done with JAVA programming easily. But the simplest way to bind two or more files in a single file is by using winrar, where we can bind many files into a single file. . And this is the most dangerous for them who downloads movies , ebooks and so on. Not only that we can also set the program priority, means which program to run first.

So we think we have made you clear why we have discussed this before you as in our next discussions we will discuss about different types of wares.

With Love

Urproblemmysolution Team