GMSoft Dialer

GMSoft is a porno dialer that controls the user's modem to install and store pornographic material onto the user's computer at high-costs phone rates. The installation of GMSoft occurs when the user is visiting pornographic sites (whether intentional or nonintentional). The installation of GMSoft is usually without the knowledge or permission of the user.

Posted on April 19, 2008 in Dialers

SafetyAlertings.com

SafetyAlertings.com is a tricky and dangerous website associated with fake anti-spyware applications. SafetyAlertings.com was designed by scammers to promote and sell rogue security software such as WinPCDoctor, WinSpy and WinSecure. If you visit SafetyAlertings.com, you will receive a pop-up alert that warns you of a false spyworm.win32 infection. Browser hijackers connected with SafetyAlertings.com may also redirect your search results in any search engine to SafetyAlertings.com. In order to avoid annoying diversions to SafetyAlertings.com, you can block an IP address of the website in your HOSTS file.

Posted on April 19, 2008 in Rogue Websites

How To Remove Processes

Each running application on your computer has its own executable code or file. Usually this process or task is in the form of an executable file (.exe). Most running processes are legitimate and others may come from parasites such as malware, Trojans, adware, viruses and spyware. Ending or killing a running process related to a malicious file is essential for manual removal of a computer parasite. How to remove or kill a running process file manually. Note: Ending or killing system processes can be a difficult and risky task. If the wrong file is deleted, then important data can be lost or your computer may crash. It is essential that you backup all important files and set a System Restore point. Setting a System Restore point allows you to revert back to recover lost files. To set a System Restore point, go to Start menu > All...

Posted on April 18, 2008 in Tutorials

CoolWebSearch

CoolWebSearch is a low quality search engine that is closely associated with adware and browser hijackers. Components associated with CoolWebSearch are commonly referred to as Potentially Unwanted Programs because they have many of the characteristics of threats without being nearly as destructive and being easier to remove from the affected computer. CoolWebSearch is usually installed as a Web browser plug-in or add-on on the most commonly used Web browser on the Windows operating system. CoolWebSearch may be installed on Google Chrome, Internet Explorer or Mozilla Firefox. Once installed, CoolWebSearch may make various changes to the affected Web browser, including changing its default search engine and homepage to CoolWebSearch and forcing the affected Web browser to visit CoolWebSearch repeatedly. Despite being marketed as a...

Posted on April 18, 2008 in Browser Hijackers

Malware Bell

Malware Bell 3.2, or MalwareBell, is a rogue anti-spyware program that is promoted on the Web through trojan video codecs. Malware Bell 3.2 sole intent is to take money from innocent computer users. The creators and their marketing affiliates propagate and install Malware Bell's rogue anti-spyware application through a download that is bundled with Trojan.Zlob. Once your computer is infected with Zlob, it will display popups that look similar to Microsoft Windows system alert messages. These fake alert messages have titles such as "Warning!", "Critical System Error!" or "Your Computer Is Infected" to convince you that your computer is in danger and that you must click on the 'OK' button to fix the problem. The fake alert message redirects to malwarebell.com or, in some cases, to other rogue websites, where there's a free download of...

Posted on April 15, 2008 in Rogue Anti-Spyware Program

Hotbar

Hotbar screenshot

Hotbar is the name of an especially nasty piece of adware. Although the company that made Hotbar has dissolved and Hotbar is no longer being actively distributed, Hotbar should still be considered dangerous. Although this particular adware is no longer as prevalent as it once was, there may still be bundled downloads or malicious sites that install Hotbar. Also, because Hotbar is so difficult to uninstall completely, it is likely that some computers that were infected with Hotbar in 2010 or earlier may still have some remnants of the adware. What Hotbar Was Supposed to Be? Hotbar provided what Hotbar referred to as targeted advertising. The idea was that Hotbar would track your Internet...

Posted on April 15, 2008 in Browser Helper Object

URL Resolver

URL Resolver, also known as URL Replacer, is an adware Browser Helper Object (BHO). URL Resolver may be bundled with other software and, once installed, will generate popup adverts and redirect your typed searches to their partner websites.

Posted on April 12, 2008 in Browser Helper Object

AntiSpywareDeluxe, ProtectingTool, AntivirusForAll, more - SpyHunter Update v.8.22

SpyHunter Spyware Definitions Update: v.8.22 (04/11/2008) SpyHunter Latest Program Update: v.3.4.9 Keep Your SpyHunter Up to Date New spyware appear almost every day. Updating your SpyHunter regularly can protect you against newly released spyware, adware, worms, trojans and other malicious threats. To use SpyHunter's Instant Definition Update, which provides the latest spyware definition updates and other program updates, go to SpyHunter > Update > Definitions Update. Our Advice: If you currently do not have SpyHunter, it is highly recommended you try SpyHunter's Spyware Scanner. Newly Added Threat List The following new parasites have been added to SpyHunter: Updated Threat List The following parasite threats were updated: XPAntivirus Toolbar.Vnbptxlf Zlob.Trojan Virtumonde SmitFraud Trojan.Generic SideSearch Trojan.Dropper-Delf...

Posted on April 11, 2008 in Database Updates

How To Remove DLLs

A DLL (Dynamic Link Library) file is an executable file that allows programs to perform predefined functions so that they may operate in the fashion that they were designed to do. DLL files are not loaded into your system’s memory which saves RAM space. Multiple programs are able to utilize one DLL file. Malicious applications such as browser plugins or browser hijackers are sometimes made up of DLL files that change settings allowing outside attackers access to your system. Removal of unwanted DLL files is an essential step to remove an infection or spyware parasite. Manual removal of an unwanted DLL file can be performed if the DLL file is unregistered first. Unregister and Remove Unwanted DLL files manually. Locate the unwanted DLL file by opening the command prompt window. Click "Start" menu > select "Run" > type in "cmd" > click...

Posted on April 10, 2008 in Tutorials

How To Block Malicious Websites

In today's information age, the Internet provides a means for an endless amount of information and connectivity to the rest of the world, while at the same time opens, the door to potential dangers if not used properly. Malicious websites are usually web pages setup to either distribute malware or steal personal information that may be used for illegal activities. A malicious website may also contain links to other online sources that could infected a suspecting computer user's system with harmful spyware, malware, viruses, Trojans and even rogue anti-spyware applications without their knowledge in some cases. Cybercriminals also create malicious websites to inject malicious code onto visitors' computers. In addition, they create web pages that mimic legitimate sites to steal information which is called Phishing. Blocking a malicious...

Posted on April 10, 2008 in Tutorials

AntiSpywareMaster, Trojan.Spy.Agent.sc, Adware.BHO.ank, more - SpyHunter Update v.8.21

SpyHunter Spyware Definitions Update: v.8.21 (04/10/2008) SpyHunter Latest Program Update: v.3.4.9 Updated Threat List The following parasite threats were updated: VirusHeat Zlob.Trojan Trojan.FakeAlert Trojan.Vundo 180Solutions.Zango Worm.Storm Trojan.Downloader-Small-CYN Adware.Vapsup Trojan.Dropper-Delf Trojan.Backdoor.Agent Trojan.Downloader.Agent-AFG Trojan.Dialer.yz Trojan-Downloader.Agent.gwh Rogue.PC-Antispyware Adware.Rabio Rogue.PC-Cleaner WebHancer Rogue.AlertSpy Trojan-Dropper.Small.bgx AntiVirusPro Trojan.Small.CJDX Trojan.Tibs Trojan.Zbot Trojan.Generic Trojan.Adload WinReanimator

Posted on April 10, 2008 in Database Updates

WinSpy

WinSpy screenshot

WinSpy is a keylogger that allows its users to monitor multiple computers on a network, whether the PCs are online or offline. WinSpy observes and records user activity, monitors network connections, logs keystrokes, takes regular screenshots, captures online chat conversations and pictures from a webcam, records e-mail messages, passwords and web sites visited. WinSpy hides deeply in the system and is able to hide its running processes. www.WinSpy.com

Posted on April 8, 2008 in Remote Administration Tools

Doctor Adware Pro, Adult-Clips, AdultTraffic, more - SpyHunter Update v.8.18

SpyHunter Spyware Definitions Update: v.8.18 (04/07/2008) SpyHunter Latest Program Update: v.3.4.9 Keep Your SpyHunter Up to Date New spyware appear almost every day. Updating your SpyHunter regularly can protect you against newly released spyware, adware, worms, trojans and other malicious threats. To use SpyHunter's Instant Definition Update, which provides the latest spyware definition updates and other program updates, go to SpyHunter > Update > Definitions Update. Our Advice: If you currently do not have SpyHunter, it is highly recommended you try SpyHunter's Spyware Scanner. Newly Added Threat List The following new parasites have been added to SpyHunter: Updated Threat List The following parasite threats were updated: Trojan.FakeAlert Zlob.Trojan WinReanimator VirusHeat Trojan.Dropper-Delf HataDuzelticisi RegistryCleanFix...

Posted on April 7, 2008 in Database Updates

Trojan.Generic, Stfngdvw Toolbar, Data Healer, more - SpyHunter Update v.8.17

SpyHunter Spyware Definitions Update: v.8.17 (04/04/2008) SpyHunter Latest Program Update: v.3.4.9 Keep Your SpyHunter Up to Date New spyware appear almost every day. Updating your SpyHunter regularly can protect you against newly released spyware, adware, worms, trojans and other malicious threats. To use SpyHunter's Instant Definition Update, which provides the latest spyware definition updates and other program updates, go to SpyHunter > Update > Definitions Update. Our Advice: If you currently do not have SpyHunter, it is highly recommended you try SpyHunter's Spyware Scanner. Newly Added Threat List The following new parasites have been added to SpyHunter: Updated Threat List The following parasite threats were updated: MalWarrior 2007 Trojan.FakeAlert Zlob.Trojan VirusHeat Qvdntlmw Toolbar SpyMaxx Trojan.Dropper-Delf Files Secure...

Posted on April 4, 2008 in Database Updates

How to Remove Registry Keys

The Windows operating system has a registry that it uses for a central hierarchy for all software applications installed on the hard drive. The Windows registry is used in all versions of Windows including Windows 9x, Windows CE, Windows Millennium, Windows NT, Windows 2000, Windows XP and Windows Vista. It is vital that registry entries are present to ensure applications and the operating system are able to operate correctly. Modifications to the Windows registry allow computer users to change general settings in addition to system policies and file associates. Remove Registry Keys or Entries Manually Manually editing the system registry can be very dangerous. If the wrong registry key is edited or deleted, then you could lose important data and damage your computer. Setting a System Restore point allows you to revert back to recover...

Posted on March 26, 2008 in Tutorials