| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

View
 

January 2011

Page history last edited by Donald Achim 8 years, 10 months ago

 

 

Elder Teckies Help Newsletter

 

Senior Computer Users of Greater Kansas City

Compiled and Edited by Don Achim  

 

A Not for Profit Organization - Helping Senior Citizens Develop Computer Skills in the 21st Century

        

 

 

 

 

January 2011

 

 

Tips for Senior Computer Users:

 

Remove Antivirus Scan - A Quick Tutorial on How to Get Rid of Antivirus Scan Permanently

 What is Antivirus Scan?

Antivirus Scan is a fake rogue antispyware program that simulates scanning computer for infections and system errors. There should be mentioned that actually it took a name of a legitimate program so be careful in distinguishing between these programs. By installing a backdoor on the infected computer, Antivirus Scan can collect the user's privacy or sensitive information automatically and then send them to the third party through the internet. We can not ignore the bad influence of Antivirus Scan and should find effective ways to get it out of our PC!

Having difficulty trying to remove Antivirus Scan? You aren't the only one as this rogue security software has infected tens of thousands of computers worldwide and shows no sign of slowing down. It has also proven to be quite difficult to remove, but thankfully there is a relatively new tool you can use to remove Antivirus Scan in minutes and that also provides complete protection against both spyware and viruses - not just one or the other as most programs do.

How To Remove Antivirus Scan

It's never too late for a remedy.

Related Coverage

Antivirus Scan is not a real spyware remover. It resembles the features and looks of genuine spyware removal software but has no ability to remove any virus, trojan or malware. Antivirus Scan is the latest addition to the increasing list of rogue Antivirus programs. Antivirus Scan is just a fake software to steal your money and to make your computer slow.

How to Get Rid of ScanDisk or Scan Disk Antivirus? Eliminate and Remove ScanDisk or Scan Disk Fake Antivirus Completely How to remove ScanDisk or Scan Disk Antivirus? Remove ScanDisk or Scan Disk Antivirus manually.How to uninstall ScanDisk or Scan Disk

HDD scan is a false antivirus application that's been designed by hackers in an attempt to get you to buy the worthless upgrade to the program. Despite looking like a legitimate tool, the program is a big fraud and needs to be removed in the most effective way possible to ensure the continued security of your PC. We've found that you need to be able to remove this virus completely to make sure that your computer is able to run as smoothly as it did before the infection, and this is how to fix

Annoyed by fake scans and popups on your desktop? In all probability, your PC has been infected by Personal Antivirus, the latest among rogue antivirus programs. If you are trying to know how to get rid of Personal Antivirus, there is an easy way out.

Just in case you do fall victim to such scams, here are quick steps that you can follow to delete this threat from your computer.

1. It works best to get rid of such by installing trusted and legit anti-spyware software. It will do the scan and identify is there is indeed a fake antivirus software in your computer. It will do the process entirely for you.

2. But if you are an expert with computers and well versed with the different locations, then you can go ahead and do the manual removal of the software.

A) You will first have to stop and kill the Antivirus Scan software.

You can do this by eliminating the exe files associated with it.
B) Get rid of all related files, folders and DLL files associated with the fake antivirus.
C) Uninstall the Antivirus Scan registry entries

Do you feel tired of viruses attacking your PC? Do you want to feel safe when you are surfing the net?

Here you can get a part of her research work to
remove Antivirus Scan program. You can get her work details on Antivirus Scan by visiting

Article Source: http://technology.ezinemark.com/remove-antivirus-scan-a-quick-tutorial-on-how-to-get-rid-of-antivirus-scan-permanently-171c3bdb01a.html



Read more:
http://technology.ezinemark.com/remove-antivirus-scan-a-quick-tutorial-on-how-to-get-rid-of-antivirus-scan-permanently-171c3bdb01a.html#ixzz19FxN8t73Under Creative Commons License: Attribution No Derivatives

 


Best free software listing....click

 

Best free Windows 7 Lessons.....click

 

Best free Windows XP tips and tricks......click

 

Best free Windows Vista tips and tricks......click

 

Computer Troubleshooting for beginners........click

 

Computer XP Maintenance for beginners......click

 

Free Computer Advice......click

 

Free Online Computer Help......click

 

Free Windows Live programs from Microsoft.....click

 

How to Block Rogue Websites and Browser Hijackers (Advanced Users)

 

 

Almost 100% of the Malware take the help of your browsers to spread and infect your PC and other’s PC. And attempting to take control of your browser is an integral part of almost all malware attacks.

There are many shapes and forms of these attempts.

 

What is Browser Hijacking

One of the technique used by these malware is browser hijacking. Browser hijacking is the modification of a web browser’s settings by malware. The term “hijacking” is used as the changes are performed without the user’s permission. Some browser hijacking can be easily reversed, while other instances may be difficult to reverse. Various software packages exist to prevent such modification. But the easiest and most commonly used trick is to look for any undesirable changes made to your hosts file. We will deliberate on it a bit later.

Some other types of Malware try to change the favorites, bookmarks and shortcuts stored in your browser settings. For removing such attempts, you have to carefully scan all these settings in your browser and take action accordingly.

Some of the websites to which your browsers automatically / fraudulently leads you try to scam you by selling fraud products like rogue antivirus / antispyware and security software. They try to trick you by displaying fake screens as if they are scanning your system for malware infections. The scan is completed with seconds and you are told that tens and hundreds of infections are there in your computer and you need to purchase XYZ software to remove these malware and clean your PC.

Some of the websites opened by browser hijackers are actually very dangerous and can potentially infect your computers. By exploiting the weaknesses and vulnerabilities in your browsers, these rogue websites are in a position to infect your computers through techniques like drive-by-downloads.

One method to solve such problems is using your Windows Hosts file. Although this is an old security measure but sometimes very effective in combating malware. A better way is to use an all round security software like PC Tools Internet Security. You can avail huge discounts on PC Tools Internet Security on this website.

 

What is Windows Hosts File

 

(Windows Hosts file is located at c:\windows\system32\drivers\etc\)

The Hosts file contains the mappings of IP addresses to host names. This file is loaded into memory (cache) at startup, then Windows checks the Hosts file before it queries any DNS servers, which enables it to override addresses in the DNS.

You can use your Windows Hosts file to combat malware and browser hijackers in two ways.

 

1. Remove Unwated Entries in Hosts file

 

Sometimes you will see some unwanted entries in your hosts file (see screenshot)

hosts-file

In this case, if you type www.yahoo.com in our browser address bar, you will be directed to the IP address, which is not of Yahoo. Although you will see http://www.yahoo.com in your address bar, but the web page shown will be different from Yahoo.

Many malware try to make such rogue entries in youu hosts file and you are fooled when you try to reach a popular website like Google, Yahoo or any other website. Once you reach there, it will try to scam you or infect you with the malware.

 

2. Block Rogue Websites in Hosts file

 

If you know about a particular rogue website, which has affected your system, you can easily block that through your Hosts file. For instance, one particular malware like Trojan modifies your system files to open rogue websites like www.windefender2009.cn.  A visit to this website will start a fake scan of your system to tell you that your system is infected and thus try to sell a rogue antispyware software to you.

It is very irritating pop-up and will make your life hell.

In order to block it, you can manually edit your hosts file using Notepad and make the following entries in the last.

127.0.0.1 www.windefender2009.cn

hosts-file1

127.0.0.1 is the IP address of your own computer and this entry in hosts file will tell your browser that this website is located within your computer. Thus effectively you will be saved from visiting that rogue website.

Recommended: 20% Off on PC Tools Internet Security 2009 – Avail huge Discount

P.S.: You can also block advertisement serving websites or porn servers by adding more entries to your hosts file.




Related Webtools and Tips...

 

Resolved: How to Keep Your Computer Safe, Clean, and Backed Up in 2011

 

 

 

Those important computer tasks—like securing, cleaning, and backing up—are like any other resolution: we all say we're going to do them but rarely keep up with them all year. Here's our simple guide to staying on track in 2011.

Keeping your computer in good shape gets to be tedious and annoying when you have to try to fit it in to your busy schedule. Rather than letting things slip through the cracks and watch your computer slow to a crawl, fall victim to a nasty virus, or crash and burn with no backups, we've put together everything you need to tackle to stay on top of all your computer maintenance tasks. Here are the four things we're going to look at (feel free to click to skip to any of the sections):

 

 

Back Up Automatically

 

 


Backing up our data is something we all know is important but many of us do not do. In the past you might've been able to get away with the excuse of inconvenience, but nowadays it's so effortless that if you're not backing up, you should make it your first order of business for the new year.

A good backup system will duplicate your important data in three places. One of them can be your computer, another can be an external hard drive that you keep in your house, but one of those three places should exist outside of your home. Local backups (like backing up to an external USB drive) protect you if a hard drive dies, but not if your house is robbed, catches fire, or you fall victim to any other incredibly fun disaster you can imagine. While these are rare circumstances, the effects are devastating. Since backup is so easy, there's really no sense in taking the risk. First we'll take a look at backing up to the cloud, which requires essentially no effort at all, and then we'll consider your options for each specific operating system so you can have a local copy on an external drive as well.

Backing Up to the Cloud

As long as your work doesn't consist of serious data creation, I'm of the opinion that you can use Dropbox

 

for all your backup needs, especially now that it includes selective sync

 

. I used Dropbox toorganize my home folder

 

and sync my iTunes library to multiple computers

 

and it works great. While Dropbox can take care of just about everything I want backed up and synced, it can't handle your applications and system files without causing problems. Also, for reasons I don't entirely understand (aside from the cost), not everyone wants to keep the majority of their stuff in their Dropbox. So, for those of you who aren't sold on Dropbox being the golden egg of cloud backup, your other best bet for off-site backup is Mozy.

Mozy

 

has become a Lifehacker favorite, especially with the speed boosts and its ability to also back up to external drives

 

. In fact, its external drive backup options make it a cross-platform tool that can pretty much handle every one of your backup needs (cloud + local drive). While I wasn't in love with Mozy when it first came about, it's now considerably faster than it was in its early days and can handle everything from one application. That's pretty tough to beat. For a full walkthrough, check out our guide to setting up a foolproof and fireproof automatic backup plan with Mozy

 

.

Backing Up to a Local Drive

NOTE: While we're not going to get picky about the brand of drive you use, make sure you get one that's a bit bigger than your computer's drive if you want to save multiple backups.

While Mozy can back up to an external drive nicely, you may prefer a backup tool with a larger feature-set that's more tailored to your operating system. Fortunately, there is no shortage of backup software available for every operating system. We've narrowed down the pool and have a few options for Windows, Mac OS X, and Linux, that should cover all your local backup needs.

Windows

Built into Windows 7 is the Backup and Restore Center

 

, which Microsoft debuted in Windows Vista and has since improved in Windows 7. While it'll take more than a few clicks to set up, you're given a good number of options to control how your data is backed up. You can choose what you want to backup, where you want to back it up (including network locations), and how often you want the backup to occur. While it may not be the perfect solution for all users, it's built into Windows and pretty easy to set up

 

.

Alternatively, you have the classic SyncBack

 

. The SE version is free but you can pay for additional features. Nearly five years ago, Gina used SyncBack SE to set up an automatic backup plan

 

that still works today. If Windows Backup Center doesn't quite cut it for you, SyncBack SE is a great alternative.

Mac OS X

One nice feature of Mac OS X 10.5 and 10.6 is Time Machine, which lets you plug in a drive and just back up with no effort at all

 

. Once it has a full copy of all your data, it will only backup the files that have changed since that original copy was made. If you want a file you lost, you can activate Time Machine and go back in time to retrieve an earlier copy of that file. Your Time Machine backup drive can also be used to restore lost data and set up a brand new Mac with all your files.

Time Machine pretty much does what it wants to do and that's that, so if you're looking for more control I'd suggest picking up Carbon Copy Cloner

 

. It's a free backup utility that makes a bootable copy of your drive (which Time Machine does not). I use it all the time and love it. It can be as simple as selecting the drive you want to copy, but you can also selectively copy certain files. Carbon Copy Cloner is very straightforward backup software, so you're not going to find the bells and whistles you might with paid software, but if you want something simple that also offers quite a bit of control over your backup, it's an ideal choice.

Linux

For easy backups on Linux machines, Back In Time

 

is a good solution. You can get your backup plan set up pretty quickly, and it backs up using space-saving snapshots (much like Apple's Time Machine). As far as Linux backup apps go, it's pretty easy to understand and runs great on GNOME and KDE-based Linux systems.

 

Secure Your Computer and Your Life Online

 

 


There are a number of ways your computer can get into trouble. Whether you're dealing with viruses, online threats, or physical theft, here are some great tools to help keep you safe.

Antivirus Software

 
For Windows, however, you don't have to look much further than Microsoft Security Essentials

 

. There once was a day when relying on third-party antivirus software was necessary, but Microsoft put those days behind us. MSE is great at ferreting out malware, performs very well, and is free. Mac OS X and Linux users generally don't have to worry too much about viruses, so you get a pass on antivirus software. But you don't get a pass on the next category.

Online Security

 

 


We've take a pretty extensive look at how to stay secure online

 

, so read through that and you should be in pretty good shape. Additionally, you'll want to take a look at how to combat spam email

 

, learn how to prevent someone from breaking into your Mac

 

or Windows PC

 

, and invade your own privacy to make sure your private information is secure

 

.

Preventing (and Preparing for) Computer Theft

Prey

 

is a wonderful, free, open-source tool that can help you track down and (potentially) recover your stolen Mac, Windows PC, or smartphone

 

. If you're like me and you've had your laptop stolen before, you know how devastating it can be. When you lose technology with personal data, the thief doesn't only have access to your expensive hardware but a lot of information about you as well. Coming to this realization is not fun, so be smart and take the necessary steps to protect yourself from a potential theft.

For those of you with iPhones (or other iOS devices), you're lucky enough to have free access to find my iPhone

 

. Set it up and use it! If you're don't have a recent iOS device, we've got you covered. Here's how to set up Find My iPhone on older iOS devices

 

.

 

Run Regular Maintenance

With your data backed up and protected, you're going to want a computer that runs smoothly. Performing regular maintenance can play a big role in keeping your machine in tip-top shape. Mac OS X and Windows 7/Vista will take care of defragmenting your drive for you—so no need to take care of it yourself—but if you're running earlier versions of Windows you should check out our guides on setting up a self-repairing hard drive

 

and setting up scheduled tasks

 

to run your favorite cleaning tasks in the background. If you're a fan of CCleaner (the all-in-one crap cleaner for Windows), check out this guide to automating your CCleaner sessions

 

.

For Mac users, maintenance tasks are regularly scheduled by OS X and so, technically, you don't have to do anything yourself. Nonetheless, it's in your best interest to play a hand in your system's upkeep. If you want a look at every possible option you have, definitely check out our guide on cleaning up and reviving your bloated, sluggish Mac

 

. Alternatively, if you want to do a bit less, you can just schedule maintenance tasks in the Terminal

 

and repair disk permissions. If you're not familiar with repairing your disk permissions, all you have to do is go into your Applications —> Utilities folder and open up Disk Utility. Inside of Disk Utility, choose the First Aid tab and then click the Repair Disk Permissions button. It'll take a few minutes and slow down the system a bit, but running this operation will help prevent little errors here and there. Running this once a month (and after any major software installation) will keep your Mac a bit happier and less prone to preventable issues.

Last, if you have a bad habit of letting your Downloads folder or Desktop get out of control, check out our guide to automatically cleaning and organizing your folders with Belvedere

 

(or with Hazel

 

if you're on a Mac).

 

Microsoft Parasite Patent to Rid Disease, Self-Destruct

 

Microsoft founder and billionaire Bill Gates has always taken great pride in his philanthropic endeavors. While a great deal of funding has been provided to HIV and AIDS research over the years, it appears as if Microsoft will assume an even more active role in combating these and other fatal diseases.

 

Microsoft's Altered Parasitic Organisms

 

Back on July 9, 2009, Microsoft filed for a patent on "Adapting Parasites to Combat Disease" that laid out plans to unleash altered parasitic organisms inside human bodies. Knowledge of Microsoft's ambitions are only now surfacing and the imagery of altered, wing-based insects engaged in an internal battle with life-threatening diseases is still a bit hard to conceptualize.

Still, the patent report suggests just that.

As one Microsoft representative commented, "Irradiated mosquitoes (for example) can be used to deliver damaged Plasmodium to individuals." (Source: ismashphone.com)

It was also insinuated that the modified parasites would be controller-operated and work to immunize high-risk individuals as well as those already infected. "Instead of contracting malaria, an individual receiving the damaged Plasmodium develops an immune response that renders the individual resistant to contracting malaria."

 

Parasite Termination Feature in Place

 

If people are able to set aside their reservations and accept this new form of parasitic warfare treatment, the question becomes, "what happens to the parasites once their job is done and the individual is cured of their disease?"

The answer also rests in the report, suggesting that the parasites contain a self-destruction or "termination feature that can include programmed death to make [internal breeding] impossible." (Source: bugbig.com)

Despite the rather creepy idea of having live parasites crawling around inside the body, if Microsoft can prove the strategy works it could be used throughout first and third world countries to combat these deadly diseases. Microsoft may well be onto something revolutionary here.

 

Elder Teckies Notes

Comments (0)

You don't have permission to comment on this page.