Showing posts with label Analysis and Recovery Virus. Show all posts
Showing posts with label Analysis and Recovery Virus. Show all posts

Wednesday, November 24, 2010

12 Top Scores Program Download Anti Virus And Download Free Anti Virus 2010

12 POPULAR ANTI-VIRUS and Internet Security PC Anti-Virus Protection 2010/2011

This test aims to compare the effectiveness of the most recent releases of popular anti-virus software1. The
products include those from Kaspersky, McAfee, Microsoft, Norton (Symantec) and Trend Micro, as well as Download free Anti Virus versions from Avast, AVG and Avira. Other products include those from BitDefender, ESET, G-Data and K7. The tests were conducted between 07/07/2010 and 22/07/2010 using the most up to date versions of the software available.

A total of 12 products were exposed to genuine internet threats that real customers could have encountered
during the test period. Crucially, this exposure was carried out in a realistic way, reflecting a customer’s
experience as closely as possible. For example, each test system visited real, infected websites that significant
numbers of internet users were encountering at the time of the test. These results reflect what would have
happened if those users were using one of the seven products tested.


Each product has been scored for its accuracy in detecting and handling malware. We awarded two points for defending against a threat, one for neutralizing it and deducted two points every time a product allowed the
system to be compromised. The reason behind this score weighting is to give credit to products that deny malware an opportunity to tamper with the system and to penalize those that allow malware to damage it. In some of our test cases a compromised system was made unstable, or even unusable without expert knowledge.

Even if active malware was removed, we considered such damaged systems to count as being compromised. The Norton product defended against all threats so it scores a full 80 marks. It was the only product to avoid being compromised by the internet threats. Kaspersky's product came a close second, losing points due to neutralizing two threats and being compromised by one.


The following illustrates the general level of protection provided by each of the security products,
combining the defended and neutralized incidents into an overall figure. This figure is not weighted with an
arbitrary scoring system as it was in 1. Overall accuracy.

The average protection levels afforded by the tested products, when exposed to the threats used in this test,
was 87.5 per cent. Above average products included those from Symantec (Norton), Kaspersky, ESET,
Avast! And G Data. Only one of these was free (Avast).


The security products provided different levels of protection. When a product defended against a threat, it
prevented the malware from gaining a foothold on the target system. A threat might have been able to infect
the system and, in some cases, the product neutralized it later. When it couldn’t, the system was compromised.

The graph below shows that the most successful products tended to defend, rather than neutralize, the
threats. Between them the top five products only neutralized 11 threats, while they defended a total of 178.
They were compromised 11 times. The five least effective products, on the other hand, neutralized 21 threats
and defended just 123. They were compromised a total of 56 times.

4. False positive levels

A security product needs to be able to protect the system from threats, while allowing legitimate software to
work properly. When legitimate software is misclassified a false positive is generated. We split the results
into two main groups because the products all took one of two approaches when attempting to protect the
system from the legitimate programs. They either warned that the software was suspicious or took the more
decisive step of blocking it.

Blocking a legitimate application is more serious than issuing a warning because it directly hampers the user.
In this test we only recorded one blocking action, which was by the K7 product as it falsely categorized the
mIRC online chat application as being a "High Security Risk".

Warnings may be of variable strength, sometimes simply asking if the legitimate application should be allowed to access the internet. This type of warning accounted for the majority seen in this test. The graph below includes the number and type of false positive that each product generated.

12 Program Anti virus Protection Scores

12 Top  Scores Program Download Anti Virus And Download Free Anti Virus 2010/2011  Protection

1.   Norton Internet Security 2011
2.   Kaspersky Internet Security 2011
3.   ESET Smart Security 4
4.   AVAST Anti Virus 5
5.   G Data Internet Security
6.   AVG Anti Virus
7.   Trend Micro Internet Security 2011
8.   Avira Personal Anti Virus
9.   BitDefender Internet Security 2010
10. McAfee Internet Security
11. Microsoft Security Essentials
12. K7 Total Security 2010

Monday, November 22, 2010

Kaspersky Anti-Virus 2010 And 2011 For Windows 2000 / XP / Vista / Windows 7

Kaspersky Anti Virus Optimized performance

Kaspersky Anti-Virus for Windows Workstations benefits from a new antivirus engine and a range of optimization technologies, ensuring the most efficient use of workstation resources and minimal impact on performance.

New antivirus engine. The application is based on a completely new antivirus engine that dramatically increases system scanning speed, optimizes the use of system resources and has minimal impact on other programs.

iSwift and iChecker. The first time on-demand scanning is launched all objects are automatically scanned. However, for subsequent scans iSwift and iChecker technologies limit scanning to new and modified files only. Additionally, when a user requests a file from the server, it is scanned only once, by the antivirus solution installed on the server.

Resource management. During periods of increased user activity, the antivirus solution reduces its demand on system resources. Scanning continues in background mode, which does not impede the user’s work with other applications.

Centralized administration
Kaspersky Administration Kit provides centralized administration for Kaspersky Anti-Virus for Windows Workstations, enabling installation, configuration and updating of all Kaspersky Lab solutions on the network.
Configuration options. The administrator can use the security policies and tasks in the program to configure protection parameters for groups of workstations or for individual workstations, launch antivirus scans, receive reports on events on the network, install license keys and update signature databases and program modules.

Quarantine for infected and suspicious objects. Secure storage locations for infected and suspicious objects are contained in a centrally managed database. Objects and/or their copies stored in these local folders are not accessible to users, but the administrator can retrieve information from them.

Notifications and reporting. A wide variety of reports are available, providing information on the program’s status and performance. The system administrator receives notifications of certain types of events (such as the detection of a virus).

Automatic updating. Updates to antivirus databases and application modules are available on demand or automatically according to a schedule. Updates can either be downloaded directly from Kaspersky Lab servers on the Internet or from local servers on the network.

Safety online.
The program scans HTTP traffic in real time using a variety of methods that include heuristic analysis of web pages. Blocking access to infected websites whose addresses are blacklisted ensures Internet users can work in a secure environment.

Protection from hacker attacks.
A new generation firewall together with IDS and IPS systems safeguard users working on any type of network, including WiFi networks. Predefined rules for more than 250 of the most commonly used applications reduce time spent on configuring the firewall.

Control over removable devices.
The application enables the use of removable devices (data storage devices, I/O devices) to be regulated on the corporate network. This reduces the risk of malicious programs penetrating users’ computers and helps prevent confidential data leaks.

Protection from phishing.
A database containing URLs of phishing sites is used to identify and disable links to such sites in the Internet browser, at the same time rebuffing emails from phishers in the mail program.

Download Free Anti Virus Kaspersky Internet Security New Release 2011
Download Free Kaspersky Anti Virus 2010 New Release 2 and 2011
Or Download

Tutorial Guide Using Ad-Aware SE to Remove Spyware & Hijackers From Your Computer

Using Ad-Aware SE to Remove Spyware & Hijackers From Your Computer Part II

2. Next click on the Advanced button on the left hand side:

1. Make sure the following items under the Logfile Detail Level category have a green check in them. If they do not, click once on the circle next to them to put a checkmark in it.

-  Include additional object information
-  Include negligible objects information
-  Include environment information
-  Include Alternate data stream details in log file

3. Next click on the Tweak button on the left hand side.

3.1. Then click on the + (plus) sign next to the Log Files section. This will expand the section. Make sure the following items under the Logfile Detail Level category have a green check in them. If they do not, click once on the circle next to them to put a checkmark in it.

a. Include basic Ad-Aware settings in logfile
b. Include additional Ad-Aware settings in logfile

3. 2. Then click on the + (plus) sign next to the Scanning Engine section. This will expand the section. Make sure the following items under the Logfile Detail Level category have a green check in them. If they do not, click once on the circle next to them to put a checkmark in it.

a. Unload recognized processes & modules during scan
b. Scan registry for all users instead of current user only

3.3. Then click on the + (plus) sign next to the Cleaning Engine section. This will expand the section. Make sure the following items under the Logfile Detail Level category have a green check in them. If they do not, click once on the circle next to them to put a checkmark in it.

a. Always try to unload modules before deletion
b. During removal, unload Explorer and IE if necessary
c. Let Windows remove files in use at next reboot
d. Delete quarantined objects after restoring

Once these settings have been completed, you should click on the Proceed button. This will bring you to the
preparation screen as show in Figure below.

Make sure you change the scan mode, designated by the red box in the figure above, to Perform full system scan. Then uncheck the Search for negligible risk entries.

Step 5: Start the Actual Scan

Now click on the Next button to have Ad-Aware SE start scanning your system. Ad-Aware SE will start scanning your system for Spyware and Hijackers. This could take a while, so you may want to do something else and come back and check on it occasionally.

Ad-Aware SE will scan various portions of your computer's configuration, file system, and memory for traces of known malware. As it finds infections, it will update the status of the scan with the amount of items it has found and what it is currently scanning. When it is finished scanning you will be presented with a screen similar to Figure below.

This computer has relatively few infections as you can by the fact that it found only 4 items. If you want to copy the contents of the scan log, you can click on the Show Logfile button, designated by the blue box in the figure above, to open the log file and copy and paste it into another program. To finish the clean up you should now click on the Next button designated. You will then be presented with a screen that shows all the objects found that are flagged as Spyware or Hijackers.

At this point you should either right click on the screen and and choose the Select All Objects option or individually put a checkmark in each objects checkbox, designated by the area surrounded , that you would like quarantined. When all the objects that you would like quarantined are checked, you should click on the Next button. Ad-Aware SE will now present you with a confirmation box as to whether or not you would like to remove the objects you have just selected. If you would like to do so, press the OK button, otherwise press the Cancel button to go back to the selection screen. If you press the OK button, Ad-Aware SE will move all the selected items into the quarantine. When it is done putting all the checked items into quarantine, you will be presented with the Startup/Status Screen.

 Step 5: Cleaning up the QuarantineWith the moving of the select objects to the quarantine now completed you will be presented with a screen. As was said before, when you fix items with Ad-Aware SE it does not automatically delete them, but adds them to a quarantine file that takes up hard drive space. Therefore it is not a bad idea to get rid of them. Before you do so, though, it is good to use your computer for some time to make sure any of the items you have quarantined did not break functionality of any programs that you need to use. If you find that it has caused no problems, then you should continue.

As you can see you now have all of the items you checked off in your quarantine. To access this quarantine you should click on the link that says "Open Quarantine List". This will present you with an image.

At this point you should select the quarantine file that you would like to delete and press the delete key. The
quarantine file is now deleted off your hard drive. When you are done deleting your quarantine files, you can exit the program.

Now that you know how to use Ad-Aware SE you now have another tool at your disposal to combat the growing threat of Spyware and Hijackers.

Sunday, November 21, 2010


Spybot Search & Destroy is a free tool from Safer Networking Limited used for identifying and removing spyware, adware, and various other non-virus malware from Microsoft Windows systems. These programs are often installed by Trojan horses, as part of some freeware and shareware applications, or as "drive-by installations" from various websites.

The programs invade your privacy and interfere with your work by transmitting your personal information to their creators, opening unwanted pop-up windows, and modifying your Internet Explorer settings. Removing these applications by hand is a difficult process, but Spybot S&D can remove many of these programs automatically and safely.

1. Obtaining Spybot and Starting Installation

Before you install Spybot Search & Destroy 1.4, you should use the Add/Remove Programs control panel to remove any previous versions. Once you've done that, you can obtain Spybot Search & Destroy in one of these ways:
• Install with Scout
If you’ve installed Scout, you can just start Scout, click on the “Spybot - Search and Destroy” button, and Scout will download and install it for you automatically. For information on getting Scout, see “Scout: Getting Network Software for Computers Running Windows (WNG 231)” at

• Download from the Web
Spybot is available from the author's website at http://www.safer– Click on a language choice from the list on the left or by location on the globe. Click Download, then click the “Download here” button next to “Spybot- Search and Destroy ” Then click “Download here” next to any one of the mirrors listed. Save the file to the Desktop, then start the installation by double-clicking on the spybotsd14.exe icon on your Desktop. Now skip to "Continuing the Installation".

• Install with Scout
If you’ve installed Scout, you can just start Scout, click on the “Spybot - Search and Destroy” button, and Scout will download and install it for you automatically. For information on getting Scout, see “Scout: Getting Network Software for Computers Running Windows (WNG 231)” at

• Use the Solution Center VirusScan CDA CD is available at the Solution Center, 195 Durham Center, which has VirusScan and Spybot- Search and Destroy. Put the CD into your CD Rom drive and click the “Install Spybot- Search and Destroy” button. The installation will happen automatically.

2 . Continuing the Installation.

To install, follow these steps:

1. Select the language to use during the installation and click OK.
2. The "Setup–Spybot–Search & Destroy" window will appear. Click Next.
3. Read the license agreement. If you agree, click I accept the agreement and click Next.
4. Click Next to accept the standard program directory.
5. Click Next to accept a full installation.
6. Click Next to create a "Spybot–Search & Destroy" folder in the Start Menu.

7. The Select Additional Tasks window will appear. By default, Spybot will put an icon on the Desktop and in the Quick Launch area of the taskbar, and will install SDHelper, a tool for adding protection to Internet Explorer. Turn on "Use system settings protection" to add TeaTimer, a tool to prevent unauthorized changes to system settings.

8. Click Next, then Install, then Finish. Spybot S&D will automatically start after the installation.

9. The "Legal Stuff" window will appear. Read the text, turn on "Don't show this message
again" and click OK to continue.

10. You'll be given the opportunity to make a backup of the Windows registry. This is a good thing, but will take some time and disk space, so you can skip it and click Next if you're short of either. Otherwise, click Create registry backup. This may take several minutes. When the backup is finished, click Next (which will reappear in the window) to continue.

11. If you have an Internet connection, click Search for updates.

12. If the button "Download all available updates" appears, click Download all available updates. When the updates have been downloaded, click Next.

13. Click Immunize this system. When Spybot reports how many bad products have been blocked, click Next.

14. A dialog box will appear giving you three choices:
-Read tutorial
-Read help file
Start using the program
If you've never used Spybot Search & Destroy before, we recommend that you read the tutorial. If you've used a previous version, you should read the help file to see what's changed. If you're brave, go straight into using the program and jump in these directions to step 2 of "Using Spybot Search & Destroy" but don't say we didn't warn you.

3 Using Spybot Search & Destroy

1. Choose Start -> Programs -> Spybot–Search & Destroy -> Spybot–Search & Destroy.

2. Unless you've just installed SS&D and did the search for updates, you should click Search for updates to see if new definitions have been created. If they have, check the boxes to download each of the files and click Download updates.

3. In the menu on the left, click on Search & Destroy, then click Check for problems. SS&D will search your computer for problem files and programs and the check boxes for the probl list them in its window. Depending on the speed of your computer, this could take a while.
4. When the problem check is finished, a list of problems will be displayed. These fall into
three categories:

Red entries: Spyware should be removed. The boxes for these entries will already be checked. Black entries: System internals that should only be fixed if you can identify the problem.

This usually requires consulting the software publisher's website or technical support line. Green entries: Usage tracks (primarily browser cookies) that track where you've been on the web and what files you've opened recently in different applications. As a general rule, you can check and delete these without doing any harm to your computer.

5. Markems you want fixed, then click Fix selected problems. Click Yes when asked if you want to continue, then click OK when the "Confirmation" window appears.

6. All of the spyware products installed on your computer should now have been removed. To protect your computer from future problems, click Immunize in the menu at the left.

7. A dialog box showing the count of additional protections possible will appear. Click OK.
8. In the right pane of the window, click Immunize.
9. Optional: In the menu at the bottom of the window under "Permanently running bad
download blocker for Internet Explorer," select Ask for blocking confirmation.

Note: The download blocker may interfere with the use of some webpages. You may need to remove it to use some sites. To do so, start Spybot Search & Destroy, click on Immunize in the left-hand menu, and click Undo.

Using Ad-Aware SE to Remove Spyware & Hijackers From Your Computer

 Removed Spyware & Hijackers from Your Computer

If you suspect that you have spyware installed on your computer, then an excellent tool to remove them is Ad-Aware SE. Follow the instructions below to learn how to use Ad-Aware SE to remove these programs from your computer. Word of warning, though, Spyware can sometimes be integrated tightly into software that you use, and if you remove the spyware, that software may not function correctly. So be careful as to what you remove.

How to use Ad-Aware SE

 Step 1: Download Ad-Aware SE
The first step for Spyware/Hijacker removal is to download and install Ad-Aware SE from the link below. After it is installed, continue with the following steps.
Please download Ad-Aware SE from Lavasoft at the following link:
Download this program to a location on your hard drive that you will be able to find later. When the download is finished navigate to that location using Windows Explorer or My Computer, and double click on the file name. The file name generally starts with aawse<versiontype>.exe. For example for the current version of Ad-Aware SE Personal, the filename is aawsepersonal.exe. Follow the defaults settings when presented with options and after the program finishes installing you will be presented with a screen similar to the one below:

Uncheck all options as we will have you manually do each of these steps in the next section. Then press the Finish button.
Step 2: Start Ad-aware SE
On your desktop, double click on the icon for Ad-Aware SE. The program will open and it will appear as in Figure 2 below.

This is the main startup/status screen for Ad-Aware SE. Each section that is important for it's use has been boxed off with a different color. The red box around the Scan Now button is used when you want to scan your computer for Spyware/Hijackers. The blue box lets you get into the options screen for Ad-aware SE. The purple box is where you would click to see what Spyware/Hijackers have been quarantined. The yellow box is used to update the malware database that the program knows how to clean.

Step 3. Updating Ad-aware
The first step you should do is update Ad-Aware SE so it is using the latest Spyware/Hijacker definitions. This will enable the software to recognize as much of these types of programs that it can. You should click on the WebUpdate button highlighted, in the previous image, in yellow to start the update process. When you start the process you should see an image similar to Figure 3 below.

Now press on the connect button, designated by the red box in Figure 3, and it will check for any new updates. If no new updates are to be found you will see something like Figure 4 below. You should press OK and proceed to Step 4.

You should click once on the OK button and let it download the update. When it is done downloading the update you will be presented with a screen similar.

You can now click on the Finish button. When you do that you will be presented with the Status/Startup screen

Step 4: Set the scan options we want to use
Now that Ad-Aware SE is updated with the latest definitions, you are now ready to configure Ad-Aware SE to use optimal settings. First click on the Configuration button. You will now br presented with a new screen with various options to set. Please follow these instructions to configure Ad-Aware SE:

1. Click on the General button on the left hand side.

Make sure the following items under the Safety category have a green check in them. If they do not, click once on the circle next to them to put a checkmark in it.

1. Automatically save logfile
2. Automatically quarantine objects prior to removal
3. Safe Mode (always request confirmation)

Continued Click Here

Tutorial Zone Alarm Firewall Instructions

The information contained below is for guidance purposes only and SEGA or Sports Interactive accept no liability for any errors relating to third party software applications. Any changes made to your PC or software are done wholly at your own risk. In the event that you are encountering problems with third party software you should contact the appropriate software provider directly.

Start by opening the Zone Alarm program from the Start Menu.  When opened you will be presented with the following Window:

1. From the menu on the left, click on Program Control.

a. For reference this is highlighted in a red outline in the above screenshot.
- Select Programs.
- Select Add.

b. Search for and select the folder Sports Interactive.
Select Open.

c. Search for and select the folder Football Manager Live.
Select Open.

d. Search for and select the folder fml_launcher.exe.
Select Open.

2. From Program Control search for fml_launcher.exe from Programs.

3. From the Access and Server columns locate the program fml_launcher.exe

In each section of Access and Server select Allow for both Trusted and Internet as highlighted in
the above screenshot. Once done close the program and access Football Manager Live.

Recovering From a Trojan Horse or Virus

It can happen to anyone. Considering the vast number of viruses and Trojan horses traversing the Internet at any given moment, it’s amazing it doesn’t happen to everyone. Hindsight may dictate that you could have done a better job of protecting yourself, but that does little to help you out of your current predicament. Once you know that your machine is infected with a Trojan Horse or virus (or if your machine is exhibiting unexpected behavior and you suspect that something is wrong), what can you do? If you know what specific malicious program has infected your computer, you can visit one of several antivirus web sites and download a removal tool. Chances are, however, that you will not be able to identify the specific program. Unfortunately your other choices are limited, but the following steps may help save your computer and your files.

1. Call IT support 
If you have an IT support department at your disposal, notify them immediately and follow their instructions.

2. Disconnect your computer from the Internet 
Depending on what type of Trojan horse or virus you have, intruders may have access to your personal information and may even be using your computer to attack other computers. You can stop this activity by turning off your Internet connection. The best way to accomplish this is to physically disconnect your cable or phone line, but you can also simply “disable” your network connection.

3. Back up your important files At this point it is a good idea to take the time to back up your files.
If possible, compile all of your photos, documents, Internet favorites, etc., and burn them onto a CD or DVD or save them to some other external storage device. It is vital to note that these files cannot be trusted, since they are still potentially infected. (Actually, it’s good practice to back up your files on a regular basis so that if they do get infected, you might have an uninfected set you can restore.)

4. Scan your machine
Since your computer (including its operating system) may be infected with a malicious program, it is safest to scan the machine from a live CD (or “rescue” CD) rather than a previously installed antivirus program. Many antivirus products provide this functionality. Another alternative is to use a web-based virus removal service, which some antivirus software vendors offer (try searching on “online virus scan”). Or you could just try Microsoft’s web-based PC Protection Scan. The next best action is to install an antivirus program from an uncontaminated source such as a CD-ROM. If you don’t have one, there are many to choose from, but all of them should provide the tools you need.

After you install the software, complete a scan of your machine. The initial scan will hopefully identify the malicious program(s). Ideally, the antivirus program will even offer to remove the malicious files from your computer; follow the advice or instructions you are given. If the antivirus software successfully locates and removes the malicious files, be sure to follow the precautionary steps in Step 7 to prevent another infection. In the unfortunate event that the antivirus software cannot locate or remove the malicious program, you will have to follow Steps 5 and 6.

5. Reinstall your operating system
If the previous step failed to clean your computer, the most effective option is to wipe or format the hard drive and reinstall the operating system. Although this corrective action will also result in the loss of all your programs and files, it is the only way to ensure your computer is free from backdoors and intruder modifications.

Many computer vendors also offer a rescue partition or disc(s) that will do a factory restore of the system. Check your computer’s user manual to find out whether one of these is provided and how to run it.
Before conducting the reinstall, make a note of all your programs and settings so that you can return your computer to its original condition.

It is vital that you also reinstall your antivirus software and apply any patches that may be available. Consult “Before You Connect a New Computer to the Internet” for further assistance.

6. Restore your files 
If you made a backup in Step 3, you can now restore your files. Before placing the files back in directories on your computer, you should scan them with your antivirus software to check them for known viruses.

7. Protect your computer
To prevent future infections, you should take the following precautions:

• Do not open unsolicited attachments in email messages.
• Do not follow unsolicited links.
• Maintain updated antivirus software.
• Use an Internet firewall.
• Secure your web browser.
• Keep your system patched.

To ensure that you are doing everything possible to protect your computer and your important information, you may also want to read some of the articles in the Resources section below.