software:virus
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
software:virus [2015/11/03 02:18] – superwizard | software:virus [2016/10/24 17:53] – [webpage Screeshot chrome extension] superwizard | ||
---|---|---|---|
Line 81: | Line 81: | ||
</ | </ | ||
</ | </ | ||
- | ====== | + | ====== |
- | From: http://www.makeuseof.com/tag/10-steps-to-take-when-you-discover-malware-on-your-computer/ | + | From: http://www.flexerasoftware.com/enterprise/products/ |
+ | |||
+ | < | ||
+ | Personal Software Inspector is a free computer security solution that identifies | ||
+ | vulnerabilities in applications | ||
+ | your PC open to attacks, against which your antivirus solution may not be effective. | ||
+ | Simply put, it scans software on your system and identifies programs in need of security | ||
+ | updates to safeguard your PC against cybercriminals. It then supplies your computer | ||
+ | the necessary software security updates to keep it safe. | ||
+ | </code> | ||
- | From: http:// | ||
===== steps-to-take-when-you-discover-malware ===== | ===== steps-to-take-when-you-discover-malware ===== | ||
- | |||
- | From: http:// | ||
- | |||
- | From: http:// | ||
- | |||
- | ==== steps-to-take-when-you-discover-malware ==== | ||
- | |||
- | From: http:// | ||
- | |||
- | From: http:// | ||
- | |||
- | === steps-to-take-when-you-discover-malware === | ||
- | |||
- | From: http:// | ||
- | |||
- | From: http:// | ||
- | |||
- | == steps-to-take-when-you-discover-malware == | ||
From: http:// | From: http:// | ||
Line 116: | Line 106: | ||
- | ====== Removal Programs | + | ===== Removal Programs ===== |
- | === Make sure that you update each program to get the latest version of their databases before doing a scan. === | + | == Make sure that you update each program to get the latest version of their databases before doing a scan. == |
Line 159: | Line 149: | ||
From: http:// | From: http:// | ||
From: " | From: " | ||
+ | |||
+ | == HouseCall by Trend Micro == | ||
+ | |||
+ | From: http:// | ||
+ | |||
+ | < | ||
+ | Custom Scan lets you specify which folders to scan | ||
+ | Quick Scan reduces software scan times to a few minutes | ||
+ | Stand-alone eliminates compatibility issues associated with browser-activated scanners | ||
+ | Smart Scan delivers the latest antivirus protection while reducing download times | ||
+ | </ | ||
== Kasperky Free Security Scan: == | == Kasperky Free Security Scan: == | ||
Line 189: | Line 190: | ||
== ComboFix == | == ComboFix == | ||
From: [[http:// | From: [[http:// | ||
+ | |||
+ | == Trend Micro™ Ransomware Screen Unlocker Tool == | ||
+ | |||
+ | From: https:// | ||
+ | |||
+ | < | ||
+ | Ransomware Screen Unlocker Tool is designed to eliminate Lock Screen ransomware from your | ||
+ | infected PC in two different scenarios: | ||
+ | |||
+ | Scenario 1: Lock Screen ransomware is blocking “normal mode”, but “safe mode” with | ||
+ | networking is still accessible. | ||
+ | Scenario 2: Lock Screen ransomware is blocking both “normal mode” and “safe mode” | ||
+ | with networking. | ||
+ | </ | ||
+ | |||
+ | == HouseCall for Home Networks == | ||
+ | |||
+ | From: http:// | ||
+ | |||
+ | < | ||
+ | HouseCall for Home Networks scans all your home network devices to identify potential risks and offer advice on how to eliminate them. | ||
+ | </ | ||
== See also: == | == See also: == | ||
Line 197: | Line 220: | ||
From: " | From: " | ||
- | ====== ShouldIRemoveit | + | |
+ | ===== ShouldIRemoveit ===== | ||
From: http:// | From: http:// | ||
Line 210: | Line 234: | ||
to determine what should not be installed. | to determine what should not be installed. | ||
- | ====== toolbarcleaner not a recommeded piece of software | + | ===== toolbarcleaner not a recommeded piece of software ===== |
From: http:// | From: http:// | ||
Line 218: | Line 242: | ||
- | ====== Malware-Removal/ | + | ===== Malware-Removal/ |
[[http:// | [[http:// | ||
Line 224: | Line 248: | ||
[[http:// | [[http:// | ||
+ | ===== webpage Screeshot chrome extension ===== | ||
- | ====== Removal of Search conduit | + | |
+ | From: http:// | ||
+ | |||
+ | Also: http:// | ||
+ | |||
+ | Fiddler - Debug traffic from PC, Mac or Linux systems and mobile devices | ||
+ | |||
+ | < | ||
+ | ckibcdccnfeookdmbahgiakhnjcddpki | ||
+ | |||
+ | C: | ||
+ | ckibcdccnfeookdmbahgiakhnjcddpki | ||
+ | |||
+ | C: | ||
+ | chrome-extension_ckibcdccnfeookdmbahgiakhnjcddpki_0.localstorage | ||
+ | chrome-extension_ckibcdccnfeookdmbahgiakhnjcddpki_0.localstorage-journal | ||
+ | |||
+ | Instead of deleting this time I made read only and mangled the localstorage database | ||
+ | </ | ||
+ | ===== List of Browser Extensions that are Spying on you (Chrome and Firefox) - HTG ===== | ||
+ | |||
+ | |||
+ | From: https:// | ||
+ | |||
+ | < | ||
+ | |||
+ | </ | ||
+ | ===== Removal of Search conduit ===== | ||
Installed as " | Installed as " | ||
Line 233: | Line 285: | ||
AdwCleaner cleaned it | AdwCleaner cleaned it | ||
- | ===== Rootkit Scanners | + | ===== Removal of zepto ===== |
+ | |||
+ | zepto virus | ||
+ | |||
+ | From: http:// | ||
+ | |||
+ | From: http:// | ||
+ | |||
+ | Decrypt (try locky): https:// | ||
+ | |||
+ | From: https:// | ||
+ | |||
+ | 1. Shadow Explorer: http:// | ||
+ | |||
+ | 2. deletes the original: see recovery software in malwaretips or handy recovery | ||
+ | |||
+ | |||
+ | ==== Rootkit Scanners ==== | ||
[[http:// | [[http:// | ||
Line 241: | Line 310: | ||
[[http:// | [[http:// | ||
- | ===== Malwarebytes | + | ==== Malwarebytes ==== |
[[http:// | [[http:// | ||
- | ===== Other Info ===== | + | ==== Other Info ==== |
[[http:// | [[http:// | ||
Line 253: | Line 322: | ||
- | ====== McAfee Free Tools ====== | + | ===== McAfee Free Tools ===== |
http:// | http:// | ||
Line 259: | Line 328: | ||
RootKiller: http:// | RootKiller: http:// | ||
- | ====== Look For ====== | + | ===== Look For ===== |
From: http:// | From: http:// | ||
Line 265: | Line 334: | ||
Characteristics: | Characteristics: | ||
In the local users %Username% root, a file called ' | In the local users %Username% root, a file called ' | ||
- | ====== Remove Mac Shield | + | |
+ | ===== Remove Mac Shield ===== | ||
http:// | http:// | ||
(http:// | (http:// | ||
- | ====== Mac AntiVirus | + | ===== Mac AntiVirus ===== |
http:// | http:// | ||
Line 279: | Line 349: | ||
To remove user specific preferences simply delete " | To remove user specific preferences simply delete " | ||
- | ====== myantispyware.com free-programs | + | ===== myantispyware.com free-programs ===== |
http:// | http:// | ||
- | ====== Microsoft Security Bulletin MS08-067 | + | ===== Microsoft Security Bulletin MS08-067 ===== |
http:// | http:// | ||
- | ====== avg removal ====== | + | ===== avg removal ===== |
http:// | http:// | ||
- | ====== Administrator and User Passwords in Windows XP ====== | + | ===== Administrator and User Passwords in Windows XP ===== |
Line 301: | Line 370: | ||
- | ====== Information about vulnerabilities associated with the settings of installed applications and the operating system. ====== | + | ===== Information about vulnerabilities associated with the settings of installed applications and the operating system. ====== |
software/virus.txt · Last modified: 2020/12/16 05:12 by superwizard