Computer technician blog
General - General posts, notices and other information.
Viruses - News and articles related to viruses, will be posted in this section.
Windows - How-To guides for Windows users.
Mac - How-To guides for Mac users.
You can subscribe to RSS Feed
How to create a new user account using Command Prompt?
This tutorial describes how to create a new user account in the Windows operating system using Command Prompt. The guide is helpful when dealing with ransomware or fake antivirus programs that block Safe Mode and Safe Mode with Networking. Cyber criminals responsible for developing malicious programs develop new methods to protect their bogus software from elimination - this includes blocking users' access to Safe Mode.
How to burn and use a rescue CD? A method to remove ransomware from your PC.
The recent outrage of ransomware (screen lockers) has impelled me to write this guide to describe how computer users can boot from a rescue disk. Whilst rescue disks are no longer the most common method to remove spyware and viruses, the recent rise in screen locker infections makes them an effective alternative to unlock your PC. Commonly, rescue disks are used to remove viruses from computers when it is impossible to use Safe Mode. In this guide, I use ImgBurn software to burn the .iso file to a CD.
Today, whilst testing new malware and fake antivirus samples, a 'great' idea occurred to me. Remember that trick when you hit CTRL+A and ENTER on your friend's computer? All programs, files, shortcuts, and everything else on the desktop are executed simultaneously. When this occurs, the only way to return the system to normal is to restart the computer.
The Idea - What if we do the same with many fake antivirus programs?
This was blowing my mind all day, so I finally decided to take the challenge and do the test. I prepared my old Intel P4 computer with 512 MB of RAM, restored it with a fresh install, and checked that it was in perfect working order.
Meet the participants - Fake antiviruses
After spending some time searching for various fake antivirus samples, I selected 14 participants. These were fake antivirus programs that attempt to scare users into buying full versions by displaying bogus warnings and errors. Some were old versions, some more recent. Before starting the test, I scanned all samples with AVG Antivirus Free Edition. One fake antivirus was not detected by AVG, despite ensuring AVG was running with the latest updates.
How to create a System Repair Disc in Windows 7
System Repair Disc is a useful option found in Windows 7, and is valuable in many situations. I believe every PC user should have this disk, since you never know when you might need it. The disk provides several solutions if you are unable to boot your operating system. For example, if your computer is infected with malware, your operating system files could be damaged, and you will just see a black screen when you try to boot your computer. If your operating system does not boot to a state whereby you can see a log-in screen, then it is likely to be a difficult problem to fix. If you have a Repair Disk, however, you can perform a Start-up Repair, and this often fixes the operating system so that you can access your desktop. You could also try performing a System Restore to roll back the configuration of your operating system to a previous state (this option is useful if you have recently installed/updated your hardware drivers and you cannot boot your computer). With the above issues in mind, a System Repair Disk is a very useful asset to have.
How to use Windows 7 and Windows Vista System Restore?
During normal operation, the System Restore feature automatically makes copies of system files and registry entries, thus allowing you to restore your operating system to a previous state. This feature is useful in many situations. For example, Windows Restore is useful if you have installed a program that considerably reduces computer performance and you are unable to uninstall it. In another example, malware, that may perhaps have infected your computer, could damage system files, and in this situation Windows System restore might be invaluable. This feature may also be used if you update/install hardware drivers and your computer subsequently becomes unstable. In summary, Windows System Restore is a useful feature that enables you to roll back to a state prior to experiencing system problems.
Rogue programs, fake antiviruses, fake security scans, fake antispyware, etc. are one of the most popular infections today.
When encountering many of the above software packages, most users believe they are genuine security products and do a good job. And of course, most of those users go on to enter their credit card details to 'purchase' one of these antivirus programs. Unfortunately, there is high probability that the user is then charged considerably more than the price declared in the shopping cart. Over a period of time, these rogue antivirus and antispyware programs have gain an increasingly professional appearance - many even attempt to imitate the interface of legitimate antivirus or antispyware products. These programs are often derived from families, so that an identical program may adopt many names. For example, 'Windows Recovery', 'Windows XP Recovery', 'Windows Diagnostic', 'Windows Vista Recovery' are names representing a single rogue program.
When you surf the Internet, be very careful. I'll keep saying that again and again. There are of course, many popular online 'scanners' that claim to scan your computer for viruses and spyware infections. These scans, however, are fake and attempt to scare PC users for illegal purposes. Do not believe these online scans, especially if you have not specifically requested one.
Wait a minute! This is important - we check your devices - Recognise this message? This is one of the most popular fake online spyware and virus scanners.
When you press OK, the web page imitates the 'My Computer' folder by displaying local hard disks, documents, folders, etc. These hard drive and document folders appear identically to all visitors of the website and do not represent real your computer configuration. To less-experienced users, however, this may appear threatening and scary.
Page 51 of 51<< Start < Prev 51 Next > End >>