software:virus
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
software:virus [2015/11/01 23:43] – superwizard | software:virus [2016/09/11 20:21] – [Removal Programs] superwizard | ||
---|---|---|---|
Line 18: | Line 18: | ||
h2 { border-bottom: | h2 { border-bottom: | ||
| | ||
+ | | ||
| | ||
| | ||
Line 23: | Line 24: | ||
| | ||
| | ||
- | | + | |
- | | + | |
- | | + | |
| | ||
| | ||
Line 31: | Line 32: | ||
} | } | ||
h3 { font-weight: | h3 { font-weight: | ||
+ | | ||
| | ||
| | ||
| | ||
- | | + | |
- | | + | |
- | | + | |
| | ||
| | ||
Line 42: | Line 44: | ||
} | } | ||
h4 { color: # | h4 { color: # | ||
- | | + | /* font-size: 144%; */ |
| | ||
+ | | ||
| | ||
| | ||
- | /* font-size: 1.0em; */ | + | font-size: 1.25em; |
- | | + | |
- | | + | |
| | ||
| | ||
Line 55: | Line 58: | ||
h5 { | h5 { | ||
- | display: block; | + | |
- | font-size: .83em; | + | display: block; |
- | margin-top: 1.67em; | + | |
- | margin-bottom: | + | |
- | margin-left: | + | |
- | margin-right: | + | |
- | font-weight: | + | |
+ | | ||
} | } | ||
h6 { | h6 { | ||
- | display: block; | + | |
- | font-size: .67em; | + | display: block; |
- | margin-top: | + | |
- | margin-bottom: | + | |
- | margin-left: | + | |
- | margin-right: | + | |
- | font-weight: | + | |
+ | | ||
} | } | ||
</ | </ | ||
</ | </ | ||
- | ====== | + | ====== |
- | From: http://www.makeuseof.com/tag/10-steps-to-take-when-you-discover-malware-on-your-computer/ | + | From: http://www.flexerasoftware.com/enterprise/products/ |
+ | |||
+ | < | ||
+ | Personal Software Inspector is a free computer security solution that identifies vulnerabilities in | ||
+ | applications | ||
+ | your antivirus solution may not be effective. Simply put, it scans software on your system and identifies | ||
+ | programs in need of security updates to safeguard your PC against cybercriminals. It then supplies your | ||
+ | computer | ||
+ | </code> | ||
- | From: http:// | ||
===== steps-to-take-when-you-discover-malware ===== | ===== steps-to-take-when-you-discover-malware ===== | ||
- | |||
- | From: http:// | ||
- | |||
- | From: http:// | ||
- | |||
- | ==== steps-to-take-when-you-discover-malware ==== | ||
- | |||
- | From: http:// | ||
- | |||
- | From: http:// | ||
- | |||
- | === steps-to-take-when-you-discover-malware === | ||
From: http:// | From: http:// | ||
Line 105: | Line 105: | ||
- | ====== Removal Programs | + | ===== Removal Programs ===== |
- | === Make sure that you update each program to get the latest version of their databases before doing a scan. === | + | == Make sure that you update each program to get the latest version of their databases before doing a scan. == |
Line 148: | Line 148: | ||
From: http:// | From: http:// | ||
From: " | From: " | ||
+ | |||
+ | == HouseCall by Trend Micro == | ||
+ | |||
+ | From: http:// | ||
+ | |||
+ | < | ||
+ | Custom Scan lets you specify which folders to scan | ||
+ | Quick Scan reduces software scan times to a few minutes | ||
+ | Stand-alone eliminates compatibility issues associated with browser-activated scanners | ||
+ | Smart Scan delivers the latest antivirus protection while reducing download times | ||
+ | </ | ||
== Kasperky Free Security Scan: == | == Kasperky Free Security Scan: == | ||
Line 186: | Line 197: | ||
From: " | From: " | ||
- | ====== ShouldIRemoveit | + | |
+ | ===== ShouldIRemoveit ===== | ||
From: http:// | From: http:// | ||
Line 199: | Line 211: | ||
to determine what should not be installed. | to determine what should not be installed. | ||
- | ====== toolbarcleaner not a recommeded piece of software | + | ===== toolbarcleaner not a recommeded piece of software ===== |
From: http:// | From: http:// | ||
Line 207: | Line 219: | ||
- | ====== Malware-Removal/ | + | ===== Malware-Removal/ |
[[http:// | [[http:// | ||
Line 213: | Line 225: | ||
[[http:// | [[http:// | ||
+ | ===== webpage Screeshot chrome extension ===== | ||
- | ====== Removal of Search conduit | + | |
+ | From: http:// | ||
+ | |||
+ | Also: http:// | ||
+ | |||
+ | Fiddler - Debug traffic from PC, Mac or Linux systems and mobile devices | ||
+ | |||
+ | < | ||
+ | C: | ||
+ | ckibcdccnfeookdmbahgiakhnjcddpki | ||
+ | |||
+ | C: | ||
+ | chrome-extension_ckibcdccnfeookdmbahgiakhnjcddpki_0.localstorage | ||
+ | chrome-extension_ckibcdccnfeookdmbahgiakhnjcddpki_0.localstorage-journal | ||
+ | |||
+ | Instead of deleting this time I made read only and mangled the localstorage database | ||
+ | </ | ||
+ | ===== List of Browser Extensions that are Spying on you (Chrome and Firefox) - HTG ===== | ||
+ | |||
+ | |||
+ | From: https:// | ||
+ | |||
+ | < | ||
+ | |||
+ | </ | ||
+ | ===== Removal of Search conduit ===== | ||
Installed as " | Installed as " | ||
Line 222: | Line 260: | ||
AdwCleaner cleaned it | AdwCleaner cleaned it | ||
- | ===== Rootkit Scanners | + | ===== Removal of zepto ===== |
+ | |||
+ | zepto virus | ||
+ | |||
+ | From: http:// | ||
+ | |||
+ | From: http:// | ||
+ | |||
+ | Decrypt (try locky): https:// | ||
+ | |||
+ | From: https:// | ||
+ | |||
+ | 1. Shadow Explorer: http:// | ||
+ | |||
+ | 2. deletes the original: see recovery software in malwaretips or handy recovery | ||
+ | |||
+ | |||
+ | ==== Rootkit Scanners ==== | ||
[[http:// | [[http:// | ||
Line 230: | Line 285: | ||
[[http:// | [[http:// | ||
- | ===== Malwarebytes | + | ==== Malwarebytes ==== |
[[http:// | [[http:// | ||
- | ===== Other Info ===== | + | ==== Other Info ==== |
[[http:// | [[http:// | ||
Line 242: | Line 297: | ||
- | ====== McAfee Free Tools ====== | + | ===== McAfee Free Tools ===== |
http:// | http:// | ||
Line 248: | Line 303: | ||
RootKiller: http:// | RootKiller: http:// | ||
- | ====== Look For ====== | + | ===== Look For ===== |
From: http:// | From: http:// | ||
Line 254: | Line 309: | ||
Characteristics: | Characteristics: | ||
In the local users %Username% root, a file called ' | In the local users %Username% root, a file called ' | ||
- | ====== Remove Mac Shield | + | |
+ | ===== Remove Mac Shield ===== | ||
http:// | http:// | ||
(http:// | (http:// | ||
- | ====== Mac AntiVirus | + | ===== Mac AntiVirus ===== |
http:// | http:// | ||
Line 268: | Line 324: | ||
To remove user specific preferences simply delete " | To remove user specific preferences simply delete " | ||
- | ====== myantispyware.com free-programs | + | ===== myantispyware.com free-programs ===== |
http:// | http:// | ||
- | ====== Microsoft Security Bulletin MS08-067 | + | ===== Microsoft Security Bulletin MS08-067 ===== |
http:// | http:// | ||
- | ====== avg removal ====== | + | ===== avg removal ===== |
http:// | http:// | ||
- | ====== Administrator and User Passwords in Windows XP ====== | + | ===== Administrator and User Passwords in Windows XP ===== |
Line 290: | Line 345: | ||
- | ====== Information about vulnerabilities associated with the settings of installed applications and the operating system. ====== | + | ===== Information about vulnerabilities associated with the settings of installed applications and the operating system. ====== |
software/virus.txt · Last modified: 2020/12/16 05:12 by superwizard