Category Archives: Thoughts
An questionable Task Manager
Always I have a feeling of safety when a computer program ask for my authorization to update itself and absolutely always I have a deception and I’m concerning when I log some connections made by a program without my knowledge. It does not matter the purposes of these “hidden” connections or of some supposed “hidden” processes, in my opinion, all of the actions invisible to the user performed by a program are a potential threat, a potentially violation of the user privacy and in any case an abuse against the user. All of the people feel comfortable in their house when they know all what is happening there and in digital …
Exposing a fake antivirus
Today somebody asked me to write a good testimonial about his software, Spyware Sterilizer. Well, the things does not work this way, I can write a good testimonial only after rigorous tests and if the software deserve it, otherwise I have a feeling of bad faith regarding my readers, or this is definitely not acceptable, furthermore is the opposite of the meaning of this site. But, I will use this article to say ” sorry”, to the “author” of this software for the next honest review. You will understand later why the word “author” is within quotation marks. The software, Spyware Sterilizer by UnbeatableSoft, with subtitle ” Your perfect Spyware & …
Spigot “applicationupdater.exe”
A few days ago, I’ve noticed a new process applicationupdater.exe in the Task Manager processes list, but I did not pay too much attention to it, until today when I decided to discover what application is responsible for it. I mean, it’s normal for almost any application to connect to the web and update itself but respecting a few basic rules : the user must be asked previously for his consent to update a program an updater it’s not running for long, it runs at certain intervals, check the official site for updates and immediatelyit’s closing an application updater inform the user about what updates it’s looking for, for what …
Secure Windows XP tools, “uncoventional way”
You can easily categorize this article as an “unconventional” way to deal with malware affected computers, in order to restore their full functionality. Everybody can see all over the Internet the computer’s security related sites recommandations in the case of a virus infection : Download and install this or that antimalware or antivirus, run a deep scan of the system, job done ! This phrase in his concentrated meaning, is already a pattern of almost all of the recommandations, but in my opinion contains useless, “empty” words in most of the cases. Nowdays with the actual threats, more than ever a “set and forget” security software solution is not enough …
Scam websites
More and more people from around the world use the Internet for socializing, for online transactions, buying things, send and receive money, and about anything they can do involving interaction with other people or companies. Almost all these start with a search for your interest keywords in a powerful search engine and the most powerful is Google.com as you know but far from the perfection. Many hackers using black hat methods can manipulate the Google search results positioning their scam websites in the top of search results, though for short amount of time until Google blacklist them. Let’s dig a little how this is possible. One of the most factor …
Sandboxie — One of the best security tool
I wrote in the past an article about Sandboxie and its add-ons but I feel a such powerful security tool deserve a more in depth review. I run a small computers business and there are no rare the cases when people call me or come to me asking for an advice how to remove different malware from the computer, therefore I’m not lacking for malware samples for analysis. Always I ask people when the computer infection occur, what they did before to get that malware, trying to track the infection source. Unfortunately very often the reason why the people get their computers infected are themselves. The people behaviour on the …
Disable Autorun to prevent computer virus infections–USB flash drives threats
Almost any PC user use intensively the USB Flash Drives called popular memory sticks to transfer data between computers or between different devices as photo cameras, portable players and the computer. Many people use such a drive to share photos or music or even games with the friends and an Flash Drive with interesting content will travel from a computer to another borrowed by its owner. The Autorun and Autoplay , a rather useless I dare to say and source of troubles Windows feature, and the portable character of the flash drives create the perfect context for malware spreading. From my experience, a lot of small companies which still run Windows …