You are viewing our Forum Archives. To view or take place in current topics click here.
Mega Thread: Firewalls, Antivirus and Other security tools
Posted:

Mega Thread: Firewalls, Antivirus and Other security toolsPosted:

-1337-
  • TTG Contender
Status: Offline
Joined: Oct 12, 200915Year Member
Posts: 3,791
Reputation Power: 276
Status: Offline
Joined: Oct 12, 200915Year Member
Posts: 3,791
Reputation Power: 276
Daz's Mega Anti-Virus Thread!




How antivirus works and what does it do?
Antivirus software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware. A variety of strategies are typically employed. Signature-based detection involves searching for known malicious patterns in executable code. Some antivirus software can also predict what a file will do if opened/run by emulating it in a sandbox and analyzing what it does to see if it performs any malicious actions. If it does, this could mean the file is malicious. To protect your self you should always chec for updates, that means your antivirus should be up-to-date.


How firewall works and what does it do?
A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria. Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

Whats computer virus?
A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.


Antivirus:

Avast! Home Edition:

[ Register or Signin to view external links. ]

All-inclusive and comprehensive protection FREE avast! antivirus Home Edition includes ANTI-SPYWARE protection, certified by the West Coast Labs Checkmark process, and ANTI-ROOTKIT detection based on the best-in class GMER technology

Download:
[ Register or Signin to view external links. ]

Avira Antivirus:

[ Register or Signin to view external links. ]


Avira AntiVir reliably protects you against all threats from viruses, worms, trojans, rootkits, phishings, adware, spyware and bots. Best detection rates and top-class security with several updates every day.

AntiVir stops all types of viruses
AntiAd/Spyware eliminates ad/spyware
AntiPhishing proactive protection against phising
AntiRootkit against hidden rootkit threats
AntiDrive-by prevents against downloading viruses when surfing
EmailScanner enhanced email protection
WebGuard protection against malicious website

Download:
[ Register or Signin to view external links. ]

AVG Antivirus:

[ Register or Signin to view external links. ]

AVG - a powerful suite of applications Grisoft to help protect your computer from all sorts of online threats: viruses, worms, trojans, spyware and adware providers, hackers and spam. In the AVG Internet Free includes modules: Anti-Virus and Anti-Spyware The program is easy to use, has the ability to automatically update via the Internet and work on schedule. Compatible with Windows XP/ Windows Vista/Windows 7 and has a major anti-virus certificates: VB100%, ICSA, West Coast Labs Checkmark.

Download:
[ Register or Signin to view external links. ]

PC Tools AntiVirus Free Edition:[/b

[ Register or Signin to view external links. ]

PC Tools AntiVirus Free Edition protects against most nefarious cyber-threats attempting to gain access to your PC and personal information. Going online without protection against the latest fast-spreading virus and worms. Once infected, the virus will usually attempt to spread itself to your friends, family and associates by accessing your email contacts and networked PCs. The infection may also allow hackers to access files on your PC, use it to launch attacks against other computers and websites or to send mass SPAM email. That's why PC Tools AntiVirus Free Edition provides world-leading protection, with rapid database updates, IntelliGuard real-time protection.

[b]Download:

[ Register or Signin to view external links. ]

BitDefender AntiVirus:

[ Register or Signin to view external links. ]

BitDefender Free Edition uses the same ICSA Labs certified scanning engines found in other BitDefender products, allowing you to enjoy basic virus protection. BitDefender Free Edition is an on-demand virus scanner, which is best used in a system recovery or forensics role.

Download:
[ Register or Signin to view external links. ]


ESET NOD32 AntiVirus:

[ Register or Signin to view external links. ]

The fastest, most effective technology available to protect you from viruses and spyware without slowing you down while you work or play.

Download:
[ Register or Signin to view external links. ]

Serial Keys:

Username: EAV-20331694
Password: cesd2jnkad

Username: EAV-18476467
Password: pjn2n386cd

Username: EAV-18151612
Password: apd8n56u86

Username: EAV-20265886
Password: arkh8pf8cj

Username: EAV-18151612
Password: apd8n56u86

Username: EAV-20336508
Password: kdkpttt5jd

Username: EAV-20335239
Password: ru2bdbprpe

Username: EAV-20806371
Password: 53epdv4mtx

Username: EAV-18122229
Password: ekvf4n2b5a

Kaspersky Internet Security:

[ Register or Signin to view external links. ]

Kaspersky Internet Security automatically protects you and your family at all times whether you work, bank, shop or play online. Kaspersky Internet Security has everything you need for a safe and secure Internet experience. Kaspersky Internet Security stops your PC being slowed down by cybercriminals and delivers unsurpassed on-line safety whilst protecting your files, music and photos from hackers:

Keeps your money and identity safe Improved!
Protects against bank account fraud
Safeguards against online shopping threats
Allows questionable applications and websites
to be run in 'Safe Run Mode' New!
Cybercriminals wont hi-jack your PC
Family protection from on-line predators
Your files wont be ruined by hackers Improved!
Keeps your PC running smoothly

Download:
[ Register or Signin to view external links. ]

Firewall:

Comodo Firewall:

[ Register or Signin to view external links. ]

The Comodo Internet Security was designed to be the that integrates Comodo Antivirus, Comodo Firewall and Comodo Defense in a seamless manner. We have also fixed many bugs in Comodo Firewall with this release. Comodo Firewall or Comodo Antivirus canbe installed as standalone products by using the same setup.
Internet Security combines the power of Comodo's award-winning Firewall and AntiVirus software to protect your PC from malicious software and Hackers. Best of all is FREE! Comodo Internet Security will help you detect and remove viruses, Trojans, and other malicious software and hackers, and keep them out of your computer. In one easy-to-use bundle that won't slow down your computer. All free, really!

Download:
[ Register or Signin to view external links. ]

Online Armor:

[ Register or Signin to view external links. ]

If you use online banking, buy things online, send and receive emails or just browse the internet then you're open to serious threats that your Antivirus Software just wasn't designed to stop. That's where Online Armor's Personal Firewall comes in.

Stops Hackers
Stops Malicious Programs
Protects you when Banking and Transacting Online
Protects your Identity


Online Armor currently runs on XP/Vista. This program is not suitable for Windows Vista 64. However, check the compatibility section to see if there are any conflicts with other software you may be running.

Download:
[ Register or Signin to view external links. ]

ZoneAlarm Firewall:

[ Register or Signin to view external links. ]

Protect yourself with the best multi-layered firewall technology around. ZoneAlarm keeps intruders out, protects your PC to the core and makes you invisible to hackers. It also destroys spyware, secures your privacy and provides real world services that monitor and repair all suspicious activity linked to your identity. ZoneAlarm Free makes it easy. Unlike other personal firewalls, ZoneAlarm protects automatically from the moment it`s installed - no programming required.
ZoneAlarm Free barricades your PC with immediate and complete port blocking. ZoneAlarm Free makes it easy. Unlike other personal firewalls, ZoneAlarm protects automatically from the moment it`s installed - no programming required. And, then runs in Stealth Mode to make your PC invisible on the Internet - if you can`t be seen, you can`t be attacked. ZoneAlarm Free delivers simplicity without compromising your security. A getting started tutorial explains controls and alerts to get you up and running quickly. And, to keep you confident that you`re always protected, intuitive color-coded alerts rate security risks - in real time.

Download:
[ Register or Signin to view external links. ]

Prisma Firewall:

[ Register or Signin to view external links. ]

Firewall is a barrier or a protection wall which stops the attacks of hackers, worms and some other kinds of viruses, being a support base for the computer users in protecting and scurrying data. Prisma Firewall actions as a filter which examines at the first level over the network board every data package coming from outside (whether the local or external networks) to determine if the access will or won\'t be allowed, before the information to be analyzed. The rapid evolution of local and global networks enlarged the risk of computer exposure to Internet aggressions. The attacks can take the forms of intruders (hackers, viruses, worms) which can affect the information, data or documents stocked in computer.
There are two solutions to protect data: not using the Internet and the computer networks or using the firewall programs. These programs protect information from the computer by blocking the access of the dangers coming from the outside.

Download:
[ Register or Signin to view external links. ]

Outpost firewall:

[ Register or Signin to view external links. ]

Outpost Firewall Pro been always recognized as one of the best personal firewalls in the world. One of the reasons for this is that we continuously work to improve the product's security in order to provide our customers with the best possible protection.

Download:
[ Register or Signin to view external links. ]

Astaro Security Gateway:

[ Register or Signin to view external links. ]

Astaro Security Gateway combines best-of-breed technology under one easy to use interface. Regardless of whether a company requires basic network security technology or sophisticated intrusion protection, the modular concept of Astaro Security Gateway effectively provides a well tailored security solution. A complete range of hardware appliances scale to the performance needs of most enterprises. With more than 30,000 installations, Astaro's award-winning security solutions belong to the most proliferated UTM solutions worldwide.

Download:
[ Register or Signin to view external links. ]

Other security tools:

Dr. Web Scan:

[ Register or Signin to view external links. ]

Download:
ftp://ftp.drthetechgame.org/pub/drweb/cureit/drweb-cureit.exe

ESET Online Scanner:

[ Register or Signin to view external links. ]

Download:
[ Register or Signin to view external links. ]

ATF-Cleaner:

[ Register or Signin to view external links. ]

Download:
[ Register or Signin to view external links. ]

Sandboxie:

[ Register or Signin to view external links. ]

Download:
[ Register or Signin to view external links. ]

MalwareBytes' AntiMalware:[/color]

[ Register or Signin to view external links. ]

Download:
[ Register or Signin to view external links. ]

SpyBot - Search & Destroy:

[ Register or Signin to view external links. ]

Download:
[ Register or Signin to view external links. ]

OllyDbg:

[ Register or Signin to view external links. ]

Download:
[ Register or Signin to view external links. ]

Virtual Machine:

[ Register or Signin to view external links. ]

Download:
[ Register or Signin to view external links. ]

All credits go to me and if you post somewhere else
please give credits to me because it took me 4-5 hrs to
write this mega thread. This thread will be updated if I find
any more usefuls software you can use. Cheers



How To Browse The Internet Safely!



Many people think your computer can only be infected by directly downloading a file, which in completely wrong. People also think, just having an anti-virus, means they will never become infected. The internet can be one of the best places, yet one of the worst. Considering malware is becoming more and more advanced daily (becoming undetectable, hiding under legitimate process names, disguising as Java applets or ActiveX components, etc.) We need to be on our toes to prevent the chances of becoming infected. I will be covering safety tips to keep your computer safe from infections.


Download an Anti-Virus

An anti-virus or an 'AV', is a type of software that is used to find, protect, and remove malware. Many of the newest anti-virus software comes with great web protection, which can be vital to ensure your safety online. AV's with web protection can help you by warning you how safe a website is. Take AVG for example; it shows icons or 'Reputation Shield' next to a website in a search saying how safe the website is. , Risky : Although you don't need an anti-virus to protect you online, it is recommended you do have one to ensure maximum safety. Most companies that make AV's typically have different packages depending on the security and extra features, such as; Avast!, Kaspersky, and AVG. Below are a few free recommended AV's with relatively decent web protection. Of course, if you buy the Internet Security packages of these AV's, your protection online will be substantially better. Be sure to have only one anti-virus running at one time.

Anti Viruses Above!

Download a Firewall

A firewall is a piece of software that is an essential part of your protection online. It can prevent DDoS/DoS attacks, it can prevent a hacker from infiltrating your network, shares your privacy to a greater degree, etc. Below is a list of a few, great firewalls. All have been recommended by numerous people.

FireWalls Above!

Avoid Java Drive-By's

* What is a 'Java Drive-by'? A Java Drive-by is a download, but it disguises itself to be a Java applet, or an ActiveX component, and is installed without the user's notice. The drive-by usually occurs once you open a web page.The user would see that a pop-up would ask them to 'Run' or 'Cancel'. The normal user would typically click 'Run', because it they might think the clicking 'Run' would continue onto the web page, in actuality, they have just been infected by a malicious file.

How do you prevent this? There are a few ways you can do this.
* Disable Java : Yes, this can be a tad tedious, but if you're really that worried, you can disable Java. You also have the ability to disable Java in your web browsers. This should only be used as your last option!
* Keep your Java Updated : Older versions of Java might have security exploits, which is obviously bad, and we don't want those! If you keep your Java updated to the latest update, some the the drive-by's will be detected, and or patched. You can update the latest Java update here. If you do update Java, be sure to remove the previous versions from your computer, as Java does not.

Example of what a Java drive-by could possibly look like;

[ Register or Signin to view external links. ]


If you would like more info about Java drive-by's and how to prevent them, go to this thread to see camelCase's thread on preventing Java drive-by's. It's very informational, organized, and easy to understand.


Avoid Torrents and Other Downloads


Why avoid torrents, when you can get all the music you want, for free? Because some files in torrents might be binded to other files; namely a form of malware. It's okay to use torrents, but be careful with what you download, and always try to download from a trusted user. Same thing goes for regular downloads, this includes; games, movies, music, pictures, etc. For example, you see a program online you like, and you don't want to pay for it, it's possible it can be infected. Be hasty when downloading, it can be binded with a malware. Before downloading any type of file off the internet, please read the comments about the download if there are any. It could be the thing that prevents you from getting infected. In no way, shape, or form, am I saying stop using torrents, and downloading offline, just be careful.

Media files (ie. .mp3, .avi., .jpg, etc.) that are binded with malware can be easy to spot if you're good with computers. If a media file was binded with malware, it would be called something along the lines of; Songname.mp3.exe or Songname.mp3.com. If you see '.com' or '.exe' in a media file, steer clear of that file, and remove it from your computer immediately.

How To Check To See if a File is Actually Infected


* Run the file in Sandboxie. Sandboxie is a program that runs other files, programs, URL's, etc. in a secluded place on your computer, without the risk of infection. If you suspect a file is infected, you can run the file in Sandboxie, and see if it drops any traces of malware.
If you have any futher questions, Wind has a fantastic guide on how to use Sandboxie, which is located here.
* Run the file in a virtual machine. A virtual machine or a 'VM' is a program that lets you install another Operating System inside the program. This can be great to use for testing infected files, because you can run the file on the VM's Operating System, and not on your main one. This can save you from becoming infected.
If you have any queries about running a virtual machine, look at this thread by, Xch4ng3.
* Submit the file to online malware file scanners/analyzers, such as; Virus Total, NoVirusThanks, Anubis. Virus Total and NoVirusThanks are used to scan the submitted file to different anti-viruses, and gives you the results back. While Anubis, on the other hand, actually sees what the submitted file does to a computer, with information, such as; Temporary Files created, Registry changes, Affected files, etc. These websites are outstanding when it comes to analyzing and scanning files.
* Scan the file with your anti-virus. It's as simple as it sounds. It might not be the most effective solution, but it's quick and easy.



Avoid Phishers

'Phishing' is the technique of stealing user names and password through a fake log-in page. The fake log-in page tends to look similar, if not, identical to the original page. If you enter your information into the illegitimate log-in page, the log-in info you used will be sent to the hacker, without your knowledge of this happening.

'Tab-Nabbing'

Recently, there has been a new type of a phishing attack discovered. It is called 'tab-nabbing'. Here's what it does: Say you log into Facebook, and you need to open a new tab for whatever reason. Once it is detected you are away from the web page, the 'tab-nabber' changes the 'favicon' of the web page (in this case, Facebook.) It then typically redirects you from the page, and asks you to log into the page again. You normally wouldn't think it could be harmful to you at the moment, because you see the 'favicon' and you think you're logging into the original website.

How to Prevent Falling Victim to a Phisher

* Always check the URL address of the website you are about to sign into. For example, a phisher for Live, could be 'Live.freethetechgame.org'. A website often used to be posed as, is Facebook.
* Don't give out your information in e-mails that pretend to be your bank account. This is a very common method of stealing one's credentials. The victim will receive an e-mail from their 'bank', asking for their credit card number, name, etc. to verify themselves, or something of the sort. The hacker then uses the information given by the victim to commit fraud, identification theft, etc. Sadly, multiple people fall victim to this.
* Avoid 'generators'. What I mean by that, is avoid programs or web pages that say they can give you "free points" or "free membership." None of them are real, and are either malicious, fake, or even a phisher.

Clear Your Cookies



An HTTP cookie, or more commonly known as a 'cookie' is a form of text that is stored into the user's web browser. A cookie can be used for authentication or anything else that is completed through storing data. You can clear your cookies and cache either through your web browser, or using a program such as; ATF Cleaner. The more cookies you have stored, there's higher possibility your internet will run slower. Cookies are not malicious in any way, as they cannot execute themselves. Although, they can be used as spyware, because cookies can track what you do online, and can be used to invade your privacy, or even cause malware related problems in the future.



How To Clear Your Cookies

You can easily clear your cookies, either through a program such as; ATF Cleaner or CCleaner

* Mozilla Firefox
o Click on Tools button > Click on 'Choose Recent History' > Make sure the 'Cookies' box has a check mark next to it > Click the 'Clear Now' button.

* Internet Explorer
o Click on Safety button > Click on 'Clear Browsing History' > Make sure the 'Cookies' box has a check mark next to it > Click the 'Delete' button.

* Google Chrome
o Click on the 'wrench icon' on the toolbar > Click 'Clear Browsing Data' > Place a check mark next to 'Delete Cookies' > Click the 'Clear Browsing Data' button.

Thanks And That Is All For Now

~Daz


Section 1

Table of Contents

1.0 Introduction to Infection Prevention
2.0 Importance of Infection Prevention
3.0 Potential Infectious Software Recognition
4.0 Preventing Infection
4.1 Online Anonymity
5.0 Infectious Software Treatment
5.1 Antivirus Quarantine
5.2 HiJackThis
6.0 Prevention of Infection Tools
6.1 HiJackThis
6.2 Application Isolation Software
6.2.1 Sandboxie
6.3 VPN Software
6.3.1 Hotspot Shield
6.3.2 Tor
6.3.3 Loki
6.4 Online Proxies
6.4.1 HideMyAss
6.5 Antiviruses
6.5.1 ESET NOD32
6.5.2 AVG
6.5.3 Avast
6.5.4 BitDefender
6.5.5 Kaspersky
6.6 Firewalls
6.6.1 Microsoft Windows Firewall
7.0 Conclusion

Learning how to prevent your system from being infected is one of the most important characteristics of a successful hacker. Whether youre a White Hat Hacker or a Black Hat Hacker, being able to lock out malicious programs is absolutely vital to ensure that the life and efficiency of your setup is always at its peak. Being malware free and alert of potential tribulations is essential to any hackers computing competence.

2.0 Importance of Infection Prevention

To any serious hacker, the efficiency of their computer is one of the most important things. Having a slow, ineffective machine thats jam-packed with viruses and spyware can be extremely frustrating and terribly inefficient. You want a machine that can be trusted; something that will rarely (if ever) crash. Infection prevention is the art of optimising your system with the best software possible to protect you from malicious programs. Its also the art of adapting yourself to being alert of suspicious software and threats which may, in tern, cause your system to function poorly.

3.0 Potential Infectious Software Recognition

Having the ability to recognise software that might be potentially malicious is a key part in maintaining your system and keeping it virus free. There are a few different things that you should be on the lookout for when downloading any software. Before downloading software, its important to stop and analyse it. There are a few things that should be taken into perspective: the source (website/torrent/colleague), its creator (the developer), and the feedback (reviews/write-ups/comments).

The Source

When downloading anything, whether it is something as minor as a new font for your Photoshop arsenal, or something as major as a web browser or game, taking note of the download location is vital. If you download something thats from a torrent or a poorly constructed website, youre at a far greater risk of getting infected with malicious software disguised as a legitimate application. Torrents are one of the biggest highways for malware distribution, and its highly advisable to avoid them at all costs. Should you download a program from an official website which is well-known (example: Microsoft.com), you have virtually, a zero percent chance of being infected. This is probably considered as commonsense, but some programs can be difficult to deduce whether or not their source is, in fact, legitimate. This is where you have to look at other factors such as the creator and the feedback.

The Creator

The creator of an application or document is often one of the most important elements used to decide whether a download is safe or not. If youre contemplating downloading something from a torrent and have very little information on the creator, its advised not to download the file. Likewise, if youre downloading something from a poorly constructed website, with few regular viewers, its also advisable to avoid such downloads. Knowing the creator of the program is a trusted developer, it makes your decision a whole lot easier. For example, downloading a program from a Hack Forums user with over thirty + Reputation generally means the file will be clean. Once again, this is common knowledge, but its important to note that members with one or two posts and zero + Reputation would be considered as a bad source. Its highly advisable to not download from members who dont have a good reputation. A hacking forum is a prime target for script kiddies who want to infect people with their software. When situations get more difficult, and lie borderline between potentially dangerous and clean, youve got to assume theyre dangerous. This is where you should look at other information such as the feedback the creators received.

The Feedback

Feedback can be information such as comments, ratings, and reputations. If a torrent has good comments, and a quality rating, then it can often be trusted as a legitimate download. Similarly, as mentioned above, a Hack Forums member with over ten + Reputation is far more likely to be trustworthy, rather than a new member with one post.

When these three elements are analysed and youve corroborated correctly, youll normally have a good ideas as to whether its a trustworthy program or not. If youre still unsure about a programs authenticity, Id advise you not to download it.

4.0 Preventing Infection

Preventing infection is critical for the maintenance of your machine. Not only that, but it makes your overall computing experience much more gratifying. One of the most efficient ways to remain infection free, is to stay as anonymous as possible when online.

4.1 Online Anonymity

Online anonymity is that act of being unknown to third-party users when surfing the Internet. Whether it be social networking services, forums, or signups, its strongly advised to remain as secret as possible. This can be done in a number of ways, though the most obvious is providing incorrect personal information. If being targeted by any Black Hat Hacker, most people are at a great risk of being exploited because they have private information show publically online. To dox someone means to find out as much personal information as possible. In the hacking world, this form of discovery is used to seek out an appropriate target. Obviously, not being able to be doxed is extremely important to remain anonymous. Being secure and unknown is the best way to operate online if youre serious about security. Having personal details such as your name, age, phone number, address, e-mail address available to public figures who, to your knowledge, could be anyone, is not a safe way to operate. When signing up for forums, services, and other online aptitudes, its advised to provide as much incorrect information as possible to remain anonymous.
Section 2

5.0 Infectious Software Treatment

Falling victim to malware infection is normal, and its very difficult to completely protect yourself. The fact is, sooner or later, youre highly likely to become infected. Obviously prevention is the key, but seeking the right treatment for an infection is vital. There is a lot of software which aims at protection and prevention, yet sadly there isnt a lot when it comes to cure. Many antivirus programs have the ability to quarantine suspicious files, which is imperative for quick removal. Another method of seeking out problems is implementing the HiJackThis service.

4.1 Antivirus Quarantine

Most antivirus softwares have the ability to quarantine suspicious files. Having antivirus software is, possibly, the most mandatory tool to any hacker. Good quality antivirus programs have capability to detect malicious programs when you come in contact with them. This is rather effective and helps prevent much potential destruction.

4.2 HiJackThis

HiJackThis is an online service based upon gathering logs of your systems functionality. A HiJackThis log is a depiction of your systems output and, when analysed correctly, can be an extremely useful tool to seek out the problem, and in tern, patch the problem. Ill go into more detail on the HiJackThis service later on.

5.0 Preventing Infection

Preventing infection is critical for the maintenance of your machine. Not only that, but it makes your overall computing experience much more gratifying.

6.0 Prevention of Infection Tools

This section will justify some of the essential tools often used to prevent infection. Having competent software is extremely important to the survival of your system. One cannot prevent being infected without the aid of a few basic tools, which is why Ive detailed some of the basic software regularly used to prevent your system from being compromised.

6.1 HiJackThis

As mentioned above, the HiJackThis resource is one of the most important services freely available online to diagnose infected systems. Analysing HiJackThis logs, does however take a lot of time and if incorrectly scrutinized, can cause much harm to a computer system. This is why, its advised that you seek the help of a trained HiJackThis analyst before attempting anything yourself.

Availability

The HiJackThis Website

6.2 Application Isolation Software

Application isolation software is software used to safely test suspicious applications in the safety of an isolated provision. An example might be, youve just downloaded a file that your friend said was a really cool game. You know this person often tries to infect people with various exploits such as Remote Administration Tools, so you dont want to take any chances. The best thing to do in this scenario would be to use application isolation software. Thisll allow you to see if it really is a game, or if it has other intentions.

6.2.1 Sandboxie

Though there is other application isolation software available, Sandboxie is regarded as one of the more efficient tools. Its designed to provide a safe environment for you to test any suspicious files in.

Availability

The Sandboxie Website

6.3 VPN Software

VPN software, or a Virtual Private Network, is a tool used to remain anonymous online. The importance of remaining undetectable was stressed above, which is why Ive justified some leading VPN tools. A VPN assigns you an IP address from the VPN server itself. This means, youre able to browse the Internet through a third-party IP address. This is useful for bypassing blocked websites and enhancing your anonymity when undergoing dangerous operations such as credit card thievery or account stealing.

6.3.1 Hotspot Shield

Hotspot Shield is widely known as one of the leading VPN softwares. Hotspot Shield offers complete protection and anonymity when operating online. Hotspot Shield is extremely efficient and boasts a wide range of features including the capability to store your personal details securely, a fully functional antivirus feature, and compatibility on all Windows and Macintosh platforms.

Availability

The Hotspot Shield Website

6.3.2 Tor

Tor, much similar to Hotspot Shield, is another well-known VPN service. Youre assigned an IP address from a distributed network of relays located all over the world. Tor works for a variety of Internet facilities such as instant messaging services, web browsers, and many more applications.

Availability

The Tor Website

6.3.3 Loki

Another VPN that is, arguably, in the top five VPN programs, is Loki. It offers all round efficiency with complete protection of personal details such as your IP address, FTP details, Internet passwords, browser history, and much more.

Availability

The Loki Website

6.4 Online Proxies

Similar to VPN services, proxies allows you to browse the Internet anonymously. They have the capability to circumvent implemented blocks at your location. Not only that, but a proxy can provide you with excellent security measures to help hide your online identity. Though proxies arent as powerful or as feature loaded as a VPN, theyre still an excellent alternative and allow for immediate web access.

8.4.1 HideMyAss

HideMyAss is considered to be one of the top online proxies. Its extremely efficient, and allows you to begin browsing immediately.

Availability

The HideMyAss Website

6.5 Antiviruses

An antivirus program is perhaps the most important software one can have. Quality antiviruses provide almost complete protection ranging from website security, through to malware detection. If youre a serious hacker or computing enthusiast, or would like to be, having an antivirus program is essential for prolonging the dynamism of your machine.

6.5.1 ESET NOD32

ESET NOD32 antivirus is one of the better antivirus programs around. It regularly updates several times a day to the latest virus signature database and in tern, providing optimum protection. The ESET NOD32 antivirus provides online protection and also downloads protection. Simple, yet effective, the ESET NOD32 antivirus is indefinitely, extremely efficient software.

Availability

The ESET Website

6.5.2 AVG

AVG is one of the paramount antivirus softwares, with excellent protection. With a collection of unique features, AVG is definitely an antivirus to consider. It provides a Home Security version, and also a Business Security version. With features ranging from Link Scanner technology, through to Spam and Phisher prevention, AVG is categorically excellent software.

Availability
The AVG Website

6.5.4 BitDefender

With features ranging from real-time instant messaging and e-mail scanner technology, BitDefender is deemed to be one of the preeminent antivirus softwares. With a range of different versions, BitDefender has a package thats right for you. Offering encryption services, BitDefender is hard to go past.

Availability

The BitDefender Website

6.5.5 Kaspersky

Definitely one of the top five antivirus programs, Kaspersky is hard to surpass. Offering a wide range of versions from Home and Office to Business protection, Kaspersky has the flexibility to meet your personal needs. Another helpful feature that Kaspersky provides is Online Courses which are designed to teach about the way the Kaspersky Lab products work and how to implement them most efficiently. With colour-coding of unsafe links, Kaspersky Anti-Virus provides an adaptable interface suited to your personal needs.

Availability

The Kaspersky Website

6.6 Firewalls

A firewall is a basically a virtual wall that protects remote users from attacking your system. The main purpose is to prevent unwanted traffic that can be used to slow or danger your machine. Denial of Service attacks, sniffing, and network penetration can all be accounted for with the use of a simple firewall.

6.6.1 Windows Firewall

The Windows Firewall is a built-in, host-based firewall included in Windows Vista and Windows XP (with Service Pack 2 and onwards). It offers well-rounded support and protection from any remote systems. Because the Windows Firewall is built-in software, commonsense would tell you that it isnt compatible with Macintosh and Linux platforms.

Availability

For Windows XP Users Without Service Pack 2 or Higher The Microsoft Website

7.0 Conclusion

Throughout this tutorial, the importance of preventing infection has been stressed through numerous ways. Remaining anonymous when online is one of the paramount focuses when undergoing online activity. So too, is inferring the potential threats a suspicious file may contain. Should you implement the above strategies and techniques, youve got a higher chance of preventing infection from occurring. Analysing and curing infections through the likes of the HiJackThis service and antivirus software are also important characteristic of a security alert user. The implementation of security tools is extremely important and is vital to the long life and efficiency of your system.






Spyware, also known as adware or malware, are programs that can cause many problems. These include pop up advertisements on your computer, browser hijacks, search engine hijacks, website redirections, personal information being logged without your permission, preventing you access to certain sites or the whole internet and other computer problems (like slowdowns, lockdowns, etc.). Some spyware are worst than viruses, in my opinion. They are becoming more and more common these days. This section was created to help you detect and remove any suspicious activity that may be going on your computer. Also included is a section on how to prevent future spyware installations. Please read and follow the steps below to help make this process much faster and easier.
Just to let you know ahead of time, all the programs that you are asked to get should be free. We don't ask you to buy any programs. There may be some programs that have a paid version and you may buy them if you wish to have some additional features (read the sites for more information if interested). If you do intend to buy some programs outside of what's listed here, I suggest asking first before you buy. I say this because there are a lot of these questionable anti-spyware programs (aka rogueware) that actually do more harm than good. If you want a list of these rogueware programs, go to Spyware Warrior for their huge list. You will see some that were known to be rogueware in the past (but have "changed their ways" since then) and you might still see us asking users to remove them. I personally think that they still can't be trusted.

- Ok now there are a lots programs,anti-spywares and they will protect you to remowe spy-wares:

If you use the Firefox browser click Firefox at the top and choose Select All.
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.

If you use the Opera browser click Opera at the top and choose Select All.
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.

Click Exit on the Main menu to close the program.


[
Register or Signin to view external links. ] Optional - If you don't have any antivirus programs installed, then I suggest getting a free one called A[url=http://free.avg.com/]VG Anti-Virus Free Edition. It has an antivirus and antispyware scanner built into one program. Download and install it. Go with the Stanrdard Installation and follow the on screen instructions. It should automatically install the updates for you during the process. Once that's done, double-click on the AVG icon on your desktop to run it. Then click on Computer scanner tab on the left. Click on Scan whole computer to let it begin the scan. Once the scan is complete, click on the blue link that says Export overview to file .... Give it a filename and save it to your desktop. Open up that file and copy/paste the entire contents of that log file here

NOTE: AVG Anti-Virus Free Edition is ONLY for Windows 2000 or higher Operating Systems. If you have Windows 95/98/ME, then use Avast Home Edition instead (see below).

[ Register or Signin to view external links. ] Optional - If you don't have an antivirus program installed and have an older version of Windows (95/98/ME), then try using [ Register or Signin to view external links. ] . Download and install it using the default install settings. Restart the computer when prompted. Then run Avast and check for any updates. Once that's done, click on the folder icon on the bottom right of Avast and select the drives you have there to be scanned (usually C: drive and other hard drives if you have additional ones). Then click on the Play button on the far left to start the scan. Remove any infected files found.

[ Register or Signin to view external links. ] Optional - Another program that you should have on your computer (if you don't have one installed already), is a firewall program. A firewall program is like a wall between your computer and the whole internet. It controls what is allowed to come it and go out. A firewall is definitely needed these days because there is just so much spyware and trojans that communicate to the internet without your knowledge. By having a firewall installed, you will know precisely what program wants to go online. So if you see a program trying to access the internet and don't recognize it, you should probably Deny it access. But if it's something you recognize (and also something you want to go online), click Allow, otherwise that program won't be able to go online. Notice I said also something you want to go online. I mention that because there may be some programs which you recognize and it shouldn't be trying to go online. It may be legitimate, but then again it may not. So unless you are expecting a new update or something, deny it. Most of these firewall programs also have a option for you to remember the settings. If you are 100% sure that something is good/bad, then you may check that box. Otherwise, leave it alone. One free firewall that I recommend using is [ Register or Signin to view external links. ] . Look for the free download link. They bury it somewhere in there.

[ Register or Signin to view external links. ] Download [ Register or Signin to view external links. ] (Windows 2000 and higher). Double-click on mbam-setup.exe to install the application.

Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
If an update is found, it will download and install the latest version.
Once the program has loaded, select Perform Full Scan, then click Scan.
The scan may take some time to finish, so please be patient.
When the scan is complete, click OK, then Show Results to view the results.
Make sure that everything is checked, and click Remove Selected.
When disinfection is completed, a log will open in Notepad and you may be prompted to restart (see Extra Note below).
The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Copy & paste the entire report into your next reply.

Extra Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately

[ Register or Signin to view external links. ] Download and install [ Register or Signin to view external links. ] .

Run SUPERAntiSpyware and click the Check for Updates button.
Once the update has finished, click the Scan your Computer button.
Click on Perform Complete Scan and then click Next.
SUPERAntiSpyware will now scan your computer and when its finished it will list all the infections it has found.
Make sure that they all have a check next to them, and then click Next.
Click Finish and you will be taken back to the main interface.
It could be possible that it will ask you to reboot your computer in order to delete some files.
I'll need a log afterwards of what has been found.
To get the log, click Preferences and then click the Statistics/Logs tab. Click the dated log and press View Log and a text file will appear.
Post the results of the SUPERAntiSpyware log file in your next reply.

[ Register or Signin to view external links. ] Perform an online virus scan at Panda ActiveScan:

Click on Scan your PC button. There should be a popup - if you have a pop-up blocker, make sure it's not blocking it.
Click Check Now and a pop-up window will appear.
Enter your Country, State and E-mail Address and click Scan Now - begin downloading Panda's ActiveX controls.
Begin the scan by selecting My Computer.
If it finds any malware, it will offer you a report. Ignore any entry it finds (since it wants you to buy the program for removal) as we will address this later.
Click on see report. Then click Save report.
Post that log in your next reply.

[ Register or Signin to view external links. ] It's always important to make sure you keep Windows up-to-date. Without the security updates, you are prone to infections. If you use Windows 2000 or Windows XP, you need to install Service Pack 4 (Windows 2000) and Service Pack 1a (Windows XP). All other old Windows version may just do their regular updates. For Windows XP, do NOT install Service Pack 2 (SP2) yet if you are having major problems. XP SP2 is very picky and can cause major problems if installed on a unstable computer. The same applies to XP Service Pack 3. If you already have the proper Service Packs installed, you may skip this section on Windows updates.

[ Register or Signin to view external links. ] - All versions of Windows can go here for the updates.
[ Register or Signin to view external links. ] - ALL users using Windows 2000 should have some Service Pack installed. I recommend getting all the way up to Service Pack 4.
[ Register or Signin to view external links. ] - ALL users using Windows XP should have at least Service Pack 1 or 1a installed (hold off on SP2/SP3 until your computer is clear of any spyware/viruses).

[ Register or Signin to view external links. ] Optional - Download and install [ Register or Signin to view external links. ] . Spybot S&D has a feature that can help block Internet Explorer immunities (these include installation of known spyware, bad ActiveX controls, etc.). Just go into Spybot->Immunize (on the left panel) and click on the Immunize button. Do this everytime you update Spybot since it may also have updates for the Immunize feature. You should see it listed in the updates though. Run Spybot S&D by double-clicking on it.

Close ALL windows except Spybot S&D
Click the button to Search for Updates and download and install the updates.
Next click the button Check for Problems.
When Spybot is complete, it will be showing RED entries, BLACK entries, and GREEN entries in the window.
Put a check mark beside the RED entries ONLY.
Choose Fix Selected Problems and allow Spybot to fix the RED entries.
After removing those files, close Spybot.

[ Register or Signin to view external links. ] Optional - Download a free version of [ Register or Signin to view external links. ] and install it. Once the install it finished, it should run Ad-Aware by default. It should also prompt you to download a new update if one is found. If it doesn't do this, click on the Update button under Update Status on the main page. You will get another message saying that there are new software updates available. Just choose NO on that screen. If you have the latest updates, it will tell you so and you may then continue on to the next step.

On the left panel, click on Scan and select Full Scan. Click the Scan button on the bottom right to begin the scan. Once the scan is completed, you can right click on any of the entries and choose Select All Objects. Then click on the Remove button. Go to the next tab (Privacy Objects) and do the same thing. That should be done now. Don't post the log in the forum unless we request for it.

[ Register or Signin to view external links. ] You had to perform the steps above to make sure that all the common spyware are found and removed. By using the above programs we will usually eliminate a handful of spyware/adware related files, which leaves less work for us to do in the end. By running those virus scans, it will help eliminate any possible viruses/trojans and maybe other malware files as well. Before we continue, go to Start->Run, type in msconfig and hit OK. Then go to Startup tab and make sure everything is checked and click OK. We want to see if there are any malware/spyware programs running at startup. You may disable these startup programs again when your computer is clean. If you need help with this, you may ask us to help you disable them at the end. Note: some version of Windows don't have msconfig so you can just skip this part to enable everything.

Things to do before running HijackThis:

Close any applications you have running currently. These include any programs running in your system tray near the clock (unless they are virus and firewall protection programs).
Go to Start->(Settings)->Control Panel->Folder Options->View and select Show hidden files and folders. Next uncheck Hide file extensions for known file types. Also make sure that Display the contents of System Folders is checked (if this option is available).

Download [ Register or Signin to view external links. ] and save it on your desktop. Run the HijackThis tool and click on Do a system scan and save a logfile. This should take a few seconds. A log file should open up. Copy and paste the entire log file in one of the following forums so someone can assist you:

Spyware Prevention


There are many ways to help prevent spyware from installing in the first place. The most obvious is to make sure to read the fine print on some "free" programs that are available online. While some say that they will collect information or install some software in the End User License Agreement (EULA), there are others that will install it without your knowledge. These are considered spyware programs. There are also other ways you may have spyware installed. This includes something as simple as visiting a site that has malicious scripts downloaded on your computer (behind the scene). To help prevent this, there are different methods that are currently being used. Remember, these methods only help prevent spyware from being installed and not remove them. Use the above instructions in the Anti-Spyware Tutorial to run the spyware scans for detection and removal.

[ Register or Signin to view external links. ] Optional - Get SpywareBlaster and SpywareGuard at [ Register or Signin to view external links. ] . Running these two programs should prevent most of the common and current spyware programs from being installed in the first place. These two programs should do most of the work already. Just make sure to get the updates if they are available. For SpywareBlaster all you have to do is check for updates and then Enable All Protection. After that you may close the program. If you use Spybot S&D and use the Immunization feature, you might want to avoid using SpywareBlaster as the entries for them may have identical entries. For SpywareGuard, you should keep that program running in the system tray at all times for real-time protection.


Last edited by -1337- ; edited 2 times in total

The following 4 users thanked -1337- for this useful post:

Cinnamon (09-02-2010), Dean (09-02-2010), Eminem- (09-02-2010), Trolling (09-02-2010)
#2. Posted:
Trolling
  • Powerhouse
Status: Offline
Joined: Aug 30, 201014Year Member
Posts: 489
Reputation Power: 23
Status: Offline
Joined: Aug 30, 201014Year Member
Posts: 489
Reputation Power: 23
What can I say?
Amazing Post.
I'm happy to see members making usefull post's like this instead of One Word Reply's, and typing "20charz;ffd!121"

Enjoy your +rep, and feel free to keep up the good posting. ;)


Plastic.
#3. Posted:
-1337-
  • TTG Contender
Status: Offline
Joined: Oct 12, 200915Year Member
Posts: 3,791
Reputation Power: 276
Status: Offline
Joined: Oct 12, 200915Year Member
Posts: 3,791
Reputation Power: 276
Thanks Man Trying To Best For The TTG Community
#4. Posted:
Eminem-
  • TTG Fanatic
Status: Offline
Joined: Feb 21, 201014Year Member
Posts: 4,190
Reputation Power: 195
Status: Offline
Joined: Feb 21, 201014Year Member
Posts: 4,190
Reputation Power: 195
Hey, nice post. Love it. Thanked +reped!
#5. Posted:
EzMoneY
  • Gold Member
Status: Offline
Joined: Apr 06, 201014Year Member
Posts: 8,517
Reputation Power: 2121
Status: Offline
Joined: Apr 06, 201014Year Member
Posts: 8,517
Reputation Power: 2121
#6. Posted:
-1337-
  • TTG Contender
Status: Offline
Joined: Oct 12, 200915Year Member
Posts: 3,791
Reputation Power: 276
Status: Offline
Joined: Oct 12, 200915Year Member
Posts: 3,791
Reputation Power: 276
What SEriously? Wow You Dont Know How Long i've Been Typing this!? :
#7. Posted:
-1337-
  • TTG Contender
Status: Offline
Joined: Oct 12, 200915Year Member
Posts: 3,791
Reputation Power: 276
Status: Offline
Joined: Oct 12, 200915Year Member
Posts: 3,791
Reputation Power: 276
Thread Updated With How To keep Safe On The Internet!
#8. Posted:
TTG_Chrisx23
  • TTG Addict
Status: Offline
Joined: May 03, 201014Year Member
Posts: 2,454
Reputation Power: 100
Status: Offline
Joined: May 03, 201014Year Member
Posts: 2,454
Reputation Power: 100
sticky this gr8 tut lol
#9. Posted:
FuttBucker
  • TTG Undisputed
Status: Offline
Joined: Jun 07, 201014Year Member
Posts: 5,144
Reputation Power: 441
Status: Offline
Joined: Jun 07, 201014Year Member
Posts: 5,144
Reputation Power: 441
uhh remove serials? those r illegal ;)
#10. Posted:
-1337-
  • TTG Contender
Status: Offline
Joined: Oct 12, 200915Year Member
Posts: 3,791
Reputation Power: 276
Status: Offline
Joined: Oct 12, 200915Year Member
Posts: 3,791
Reputation Power: 276
wow your senior nao!! well done and ty
Jump to:
You are viewing our Forum Archives. To view or take place in current topics click here.