Trojan.Generic, Stfngdvw Toolbar, Data Healer, more – SpyHunter Update v.8.17

SpyHunter Spyware Definitions Update: v.8.17 (04/04/2008) SpyHunter Latest Program Update: v.3.4.9 Keep Your SpyHunter Up to Date New spyware appear almost every day. Updating your SpyHunter regularly can protect you against newly released spyware, adware, worms, trojans and other malicious threats. To use SpyHunter's Instant Definition Update, which provides the latest spyware definition updates and other program updates, go to SpyHunter > Update > Definitions Update. Our Advice: If you currently do not have SpyHunter, it is highly recommended you try SpyHunter's Spyware Scanner. Newly Added Threat List The following new parasites have been added to SpyHunter: Updated Threat List The following parasite threats were updated: MalWarrior 2007 Trojan.FakeAlert Zlob.Trojan VirusHeat Qvdntlmw Toolbar SpyMaxx Trojan.Dropper-Delf Files Secure...

Posted on April 4, 2008 in Database Updates

How to Remove Registry Keys

The Windows operating system has a registry that it uses for a central hierarchy for all software applications installed on the hard drive. The Windows registry is used in all versions of Windows including Windows 9x, Windows CE, Windows Millennium, Windows NT, Windows 2000, Windows XP and Windows Vista. It is vital that registry entries are present to ensure applications and the operating system are able to operate correctly. Modifications to the Windows registry allow computer users to change general settings in addition to system policies and file associates. Remove Registry Keys or Entries Manually Manually editing the system registry can be very dangerous. If the wrong registry key is edited or deleted, then you could lose important data and damage your computer. Setting a System Restore point allows you to revert back to recover...

Posted on March 26, 2008 in Tutorials

AngryPing

AngryPing is created as a Trojan which mimics a flooder by overloading the user's internet connection with massive amounts of useless data. This may result in a DoS attack which can take down a website. DoS attacks are successful when many PC's are used simultaneously in such an attack. These types of applications are used many times on IRC channels to disrupt communications. AngryPing is installed onto the users PC without their knowledge or consent.

Posted on March 25, 2008 in Flooders

Seekmo

Seekmo (otherwise known as Seekmo Search, or 180Solutions.Seekmo) is adware masquerading as a search tool. Seekmo helps you to find free content, but tracks these browser activities in order to use the information as tailored pop-up advertisements targeted at you directly.

Posted on March 23, 2008 in Adware

Fake-Mailer

Fake-Mailer is a hacking tool that was designed to generate and flood other user's PC's with massive amounts of anonymous email from your computer. Fake-Mailer has the ability to install malware on the users PC such as Trojans and adware applications. FakeMailer may also come bundled with other spyware programs.

Posted on March 21, 2008 in Mail Bombers

How To Remove Malicious Files

Applications are made up of individual files. In the case of harmful spyware or malicious applications, they may have associated files. Harmful applications can be used to hijack your browser, change your settings and even monitor your web surfing activities. Generally it is required that you remove a harmful file to eliminate the threat of a spyware parasite. Removal of spyware can be done manually or with the assistance of an anti-spyware application. There is a risk involved when attempting to manually remove a computer parasite. Deleting the wrong file may damage seriously your computer. Step 1. Find out how to locate and delete unwanted malicious files. It is important to back up your system. Manually deleting files on your computer can be risky. If the wrong file is deleted, then you could lose important data and damage your...

Posted on March 20, 2008 in Tutorials

Zipclix

ZipClix is a Browser Helper Object. ZipClix comes as a toolbar that redirects web searches. ZipClix is bundled with the adware InternetWasher and SystemSoap. ZipClix may generate commercial pop-up ads. ZipClix must be installed manually and runs each time Internet Explorer is launched.

Posted on March 20, 2008 in Browser Plugins

Virtool.DoS.Synte.A

Virtool.DoS.Synte.A is a utility mostly used by virus and malware creators. These attackers employ Virtool.DoS.Synte.A to pack their executables with the help of UPX technology. Virtool.DoS.Synte.A uses UPX (Ultimate Packer for eXecutables) so that antivirus programs cannot see what is inside a malicious file.

Posted on March 19, 2008 in Malware

FavoriteMan

FavoriteMan is a browser plugin that clandestinely installs itself. FavoriteMan installs other adware and malware applications to the users PC. FavoriteMan is also known as Adware/NetPals (named by Panda), ofrg (the name of the DLL program file), TrojanDownloader.Win32.BHO (named by Kaspersky), TrojanDownloader.Win32.Rameh and Windows Help 4 Smrt Browsing. FavoriteMan has the ability to generate desktop shortcuts and bookmarks in the web browser's Favorites menu, which connect to commercial ads or malicious websites. FavoriteMan can also significantly slow down the users PC and even cause system crashes.

Posted on March 18, 2008 in Browser Plugins

SpyMaxx

SpyMaxx is a fictitious anti-spyware application which was designed by scammers with the only aim to steal money from unsuspecting Internet users. SpyMaxx is not able to detect and remove any type of computer infections, and it won't protect your PC from potential security threats. SpyMaxx attempts to fool victims into believing their machines are corrupted by numerous malware threats. Then, SpyMaxx strives to convince them to purchase the so-called registered license of its fake software program to allegedly uninstall found malware infections and repair PC problems. After successful installation, SpyMaxx executes a bogus PC system scan and announces about numerous imaginary viruses and other computer issues found on the workstation in order to frighten you into believing your PC is affected by many threats and is damaged. SpyMaxx also...

Posted on March 17, 2008 in Rogue Anti-Spyware Program

WEbCom

WebCom is an Internet Explorer Browser Helper Object )BHO). WebCom typically generates pop-up advertising, and tracks your online and Internet activity. WebCam may also redirect your search requests, and modify your browser settings and homepage.

Posted on March 17, 2008 in Browser Helper Object

How To Remove Cookies

Internet Cookies are files containing text that a web server stores on a computer users hard drive allowing a website to store pieces of information that it can retrieve later. A malicious cookie or tracking cookie, is very similar to a regular cookie only it is used to track internet activities with the intent of doing harm to a system or steal personal data. A cookie is not a program and therefore it is not able to run like other applications that may be installed on a computer. Cookies are stored in a location designated by your web browser application. If a user visits a malicious website, then their system is susceptible to becoming infected with a spyware parasite or tracking cookie. Normally, in the case of a malicious or tracking cookie infection, they can be used to compromise a computer users privacy by tracking online...

Posted on March 15, 2008 in Tutorials

Preview Unlocked 1.0

Preview Unlocked 1.0 is a Remote Remote Administration Tool which is a specific type of hacker spyware that enables the hacker to gain remote access control over the user's PC. This is achieved by the hacker infecting the PC via e-mail or File and Print Sharing. The hacker then uses a "server" which allows him to connect through a "client" on the hacker's own computer. Preview Unlocked 1.0 can be quite malicious as it has the ability to steal vital personal information from the user as well as delete important files. This application may also crash the user's system. Preview Unlocked 1.0 may take screen shots of the user's online activity and log keystrokes. Preview Unlocked is difficult to detect as it remains hidden as it operates.

Posted on March 14, 2008 in Remote Administration Tools

How to Backup and Restore Windows Registry

Your Windows registry stores important information about your computer including instructions that allow applications to function. The registry knows what kind of hardware you have, what software is installed, and how you have setup Windows. Backing it up when your computer is running well can be very useful if you ever run into problems. If you are unable to figure out why your computer is crashing, you can try restoring your registry. Why? If your computer is crashing and you are unsure as to why, then restoring a recent working registry can be very helpful and will often fix your problems. However, it is important to first back up your Windows registry before starting the process of restoring it. How to Backup the Windows Registry (Windows XP) There are many ways to back up the Windows Registry. The process listed below is the most...

Posted on March 12, 2008 in Tutorials

Sonic

The Sonic Worm spreads through email with the subject: Choose your poison or I am your poison and no body text. The infected email attachment can be either girls.exe or lovers.exe. The Sonic Worm is activated by opening the infected attachment. The Sonic Worm displays a message containing one of the following text: Girls.exe is not a valid Win32 application. Or Lovers.exe is not a valid Win32 application. The Sonic Worm replicates itself under the Windows/System directory as GDI32.exe and changes the registry entry at the following location: HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/Run If the user detects a program with the name gdi32a.exe, it is likely that the PC is infected with the Sonic Worm. Sonic Worm performs a number of malevolent acts such as stealing data from the user's PC (such as passwords, credit card...

Posted on March 12, 2008 in Worms