Monthly Archives: March 2010

A better alternative for Windows System Restore

System Restore from Microsoft Windows creates a hidden folder in each partition with the name System Volume Information. There System Restore save all the important registry changes, save some deleted executable or dll files, save the computer settings for a certain moment called Restore Point, so if you want your computer restored to a earlier date in time, the information from System Volume Information folder is used. The big problem resides in fact that the viruses loves to hide themselves in this folder, due to the advantages it offers for viruses : this folder is hidden and protected by the system . There is two ways for viruses to infect …

Continue reading

Posted in Tools & Reviews.

Anti-Keyloggers tips

A simple tip to defeat an eventual keylogger is the next : When you type a password for example begin typing the latest characters, click in front of them and type the rest. For example if password is : 123456, type first 456, right click in front of them and type the rest: 123 The keylogger will record as password: 456123 obviously wrong. You can do this in 3 steps if you want dividing the password in 3 sets of characters. You can download if you want a free small anti-keylogger from here. KeyScrambler is an add-on for your browser that encrypt anything you have typed on your web browser …

Continue reading

Posted in Tools & Reviews.

Browser tips — Opera, Chrome or Firefox

Maybe you will wonder to find out that I recommend you to use as web-browser Opera , Chrome or even Microsoft Internet Explorer 8. The last one, was declared after a study made by NSS Labs, a product analysis company, as the most resistant browser against  social engineering malware. General speaking, a social engineering malware is a Web address appearing as an inoffensive page with,  for example a video embedded, that download and execute a malicious code into your computer automatically when viewing the video or tricking the users to download an apparent harmless file  like a PDF . Another social engineering malware is when a friend with an infected computer send …

Continue reading

Posted in Thoughts.

Enable a disabled Task Manager, Registry Editor and more…

Viruses, trojans and all kind of Malware loves to disable your Task Manager to hide their presences in processes or to annoy you. There is several methods to enable the Task Manager. You will see this message : “Task Manager has been disabled by your administrator “ The simpliest method is to run a registry file with this content : Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System] “DisableTaskMgr”=dword:00000000 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\] “DisableTaskMgr”=dword:00000000 Copy-Paste it in a text(Notepad) file and save it with the extension .reg and whatever name, it should looks like this : xxx.reg Run this file(double click), reboot your computer and in the best scenario Task Manager is at place. If …

Continue reading

Posted in Thoughts.

Prevent computer infections : Checking files tips

When we download and run programs from trusted sources like products official sites or trusted sites like softpedia.com or download.com there is not an infecting danger(–maybe sometimes like in that famous Sony rootkit), but when we are downloading software from blogs or forums so called warez ? The chances to get infected with trojans, backdoors are massive. In our example we have for example an installer(setup) and a keygen(serial code generator) or a  so called crack. -It’s always a good idea to submit suspect programs to Anubis up to 8 MB size limit. Anubis is a service for analyzing malware, and you will receive a report with what your application …

Continue reading

Posted in Thoughts. Tagged with , , , .

"Must Have Tools" Series–sysinternals.com

Autoruns Always the malware, trojans, spyware, adware try to add an entry to run at system bootup, and all the malware are programmed to do so. There is a lot of ways to run an application at boot time and even if some AntiViruses claims to control 100% programs autostart, very often they miss some places. The most comprehensive knowledge of auto-starting locations are shown by Autoruns by Sysinternals.com. This little utility is far better than MsConfig utility or any other system tool. Autostart locations displayed by Autoruns include logon entries, Explorer add-ons, Internet Explorer add-ons including Browser Helper Objects (BHOs), Appinit DLLs, image hijacks, boot execute images, Winlogon notification …

Continue reading

Posted in Tools & Reviews. Tagged with , .