Blog Posts on malware




Percent:
 
Distinct:
 


Fix 25 Common Windows xp Problems Caused by Malicious Activities [Freeware] by DailyTipsNdTricks on Apr 12, 2013Hai Guys here is a tool which allows you to fix 25 common windows xp problems which are mostly caused by Virus activities on your pc.This includes, problems with your task manager, registry editor, Opening of My Document at windows startup, etc.. whi...



How to Fix Hidden Files or Folders in USB Flash Drive Infected by a Virus or a Malware by Scolex Portal - Free Article Directory on Mar 25, 2013This is my comprehensive tutorial on how to fix hidden files or folders in USB flash drive infected by a virus or a malware. I do hope that this guide will help you fix some of the common problems you've encountered while using your USB flash drive.



Different Types of Malware by DailyTipsNdTricks on Mar 5, 2013An alarming majority of internet users are either ignorant or careless about the prevalence of threats in the worldwide web. Whenever something goes wrong in their computer, they immediately dismiss it as an episodic malfunction that will not cause s...



How to remove malware into your wordpress website by Pahina.com.ph - Philippines Online Page on Feb 20, 2013Pahina.com.ph Pahina.com.ph - Write. Publish. Earn.Yesterday one of my client’s website which is based in wordpress platform had flagged by google for having malware coming from a domain http://blog1.meteorlights.info which is I’m very sure that...



Your smartphone needs a contraceptive by on Feb 12, 2013According to a new study from Blue Coat (a Web security and optimazion company ) most of the malware on mobile phones comes from porn websites. 1% of all mobile traffic is pornography, it is said that mobile users don’t check on porn sites often bu...



Trojan Horse - Myth or Computer Enemy? by Bloggers Tech on Feb 1, 2013We have all heard the term Trojan horse, but what precisely is it? A Trojan Horse is really a dangerous program that masquerades as a safe application. As opposed to viruses, Trojan Horses usually do not copy themselves, but they could be just like h...



The Cat with “Remote Control Virus” by Lazihanon Techblogger on Jan 8, 2013The Cat with “Remote Control Virus”Japanese authorities had difficulty in finding a very well know hacker that lead to series of bomb threats in schools and public places in Japan. These authorities do well on nailing cyber criminals but...



The power of COMBOFIX to your system by Montoya's Computer Repair Tips on Dec 9, 2012Combofix is a freeware (a legitimate spyware remover created by sUBs), Combofix was designed to scan a computer for  known malware, spyware (SurfSideKick, QooLogic, and Look2Me as well as any other combination of the mentioned spyware applicatio...



GMER the Rootkit Detector by Montoya's Computer Repair Tips on Dec 9, 2012           A ROOTKIT is a stealthy type of software, often malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged a...



Veta897: Verified Clean by veta897 on Dec 8, 2012I was alarmed about Malware issues. To make sure my blog is free from this warning, I scanned it with http://sitecheck.sucuri.net. The only scanner site recommended by NuffnangX. If you experienced this kind of situation follow these steps. The resu...