Tag Archives: computer
The 5 Most Common Types of Viruses
Computer viruses are those malicious programs that once they infect your computer, they will start causing mass destruction to your PC. Similar to biological viruses, they can multiply in various ways and develop from one type to another. Since there are hundreds of viruses out there, here are the five basic types of viruses that people are most likely to encounter, in order to make the identifying process easier.
Trojan Virus
Worms
Macro Virus
Boot Sector Virus
File Infector Virus
Trojan Virus – This virus appears to be nothing more than an interesting computer program or file of a user who’s interested in collecting audio files. Once this virus enters your computer, it doesn’t reproduce, but instead makes your computer vulnerable to malicious intruders by allowing them to access and read your files. A Trojan horse must be sent by someone or carried by a program or software of some sort. The malicious functionality of a Trojan horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.
Worm A Worm is a virus program that copies and multiplies itself by using computer networks and security flaws. Worms are more complex than Trojan viruses, I should say, and usually attacks multi-user systems. It can spread over corporate networks via the circulation of emails. Once multiplied, the copied worms scan the network for further escape and will then cause errors on the network.
Macro Virus – This type of virus usually comes as part of a document or spreadsheet, more often found in an email. Many of the current macro viruses are written in this language and attached to Word documents. This capability is powerful, but allows viruses to be written and executed much more easily than by using other methods.
Boot Sector Virus – A virus which attaches itself to the first part of the hard disk that is read by the computer upon start up, which are normally spread by floppy disks. In time, they can spread to other readable disks. Booting problems and start up problems, problems with retrieving data, computer performance instability and the inability to locate hard drives are all issues that may arise due to a boot sector virus infection.
File Infector Virus As the name indicates, this type of virus was designed to avoid detection by antivirus software by changing itself internally. Upon running a program that has been corrupted by a file infector, the virus copies the malicious code and applies it to other executable applications on the computer. Files that are the most vulnerable to this type of infection have the extensions of EXE. and .COM, though any file is capable of execution can be infected.
How to fight some of these viruses is still completely a puzzle for anti-virus makers. However, knowing a little about your enemies could be an advantage to get vital information on how to defend your computer from those threats. Read on Virus Removal Help – How to Remove Viruses Easily From Your PC? in order to become more familiar with the steps on how to remove the common types of viruses from your computer.
The 5 Most Common Types of Viruses
Computer viruses are those malicious programs that once they infect your computer, they will start causing mass destruction to your PC. Similar to biological viruses, they can multiply in various ways and develop from one type to another. Since there are hundreds of viruses out there, here are the five basic types of viruses that people are most likely to encounter, in order to make the identifying process easier.
Trojan Virus
Worms
Macro Virus
Boot Sector Virus
File Infector Virus
Trojan Virus – This virus appears to be nothing more than an interesting computer program or file of a user who’s interested in collecting audio files. Once this virus enters your computer, it doesn’t reproduce, but instead makes your computer vulnerable to malicious intruders by allowing them to access and read your files. A Trojan horse must be sent by someone or carried by a program or software of some sort. The malicious functionality of a Trojan horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.
Worm A Worm is a virus program that copies and multiplies itself by using computer networks and security flaws. Worms are more complex than Trojan viruses, I should say, and usually attacks multi-user systems. It can spread over corporate networks via the circulation of emails. Once multiplied, the copied worms scan the network for further escape and will then cause errors on the network.
Macro Virus – This type of virus usually comes as part of a document or spreadsheet, more often found in an email. Many of the current macro viruses are written in this language and attached to Word documents. This capability is powerful, but allows viruses to be written and executed much more easily than by using other methods.
Boot Sector Virus – A virus which attaches itself to the first part of the hard disk that is read by the computer upon start up, which are normally spread by floppy disks. In time, they can spread to other readable disks. Booting problems and start up problems, problems with retrieving data, computer performance instability and the inability to locate hard drives are all issues that may arise due to a boot sector virus infection.
File Infector Virus As the name indicates, this type of virus was designed to avoid detection by antivirus software by changing itself internally. Upon running a program that has been corrupted by a file infector, the virus copies the malicious code and applies it to other executable applications on the computer. Files that are the most vulnerable to this type of infection have the extensions of EXE. and .COM, though any file is capable of execution can be infected.
How to fight some of these viruses is still completely a puzzle for anti-virus makers. However, knowing a little about your enemies could be an advantage to get vital information on how to defend your computer from those threats. Read on Virus Removal Help – How to Remove Viruses Easily From Your PC? in order to become more familiar with the steps on how to remove the common types of viruses from your computer.
How to remove Antivirus Soft
Antivirus Soft is malicious software from the family of Antivirus Live. This malware makes entry in your PC without letting you think about it. These infections are installed in PC with help of malicious PDF file which are responsible to corrupt older versions of adobe reader. Antivirus soft malware also spread through scamming sites and social networking sites.
Once this software is installed, it continues to update itself automatically whenever you logs in your window and go online. This malware shows numerous infections which are fake and do not actually exist.
When you will be running, Antivirus Soft they display fake security alerts on the infected computer. The text of some of these alerts are:
. Antivirus Software Alert
. Infiltration Alert
. Your computer is being attacked by an internet virus. It could be a password-stealing attack, a trojan-dropper or similar.
. Threat: Win32/Nuqel.E
This program uses aggressive techniques to protect itself from being removed by anti-malware programs. Such as –
. When the Antivirus Soft process is running it will close all the running programs by falsely stating that these programs are infected.
. This malware also changes the proxy settings in IE which prevents you from browsing any other site than Antivirus Soft. This is done to force user to purchase this malicious software.
How to Remove it
This malware can hamper your entire computer activity. If you are finding yourself stuck in similar situation, you can use following steps to remove this malware from your PC –
1. Restart your computer. This is important to work on PC in a safer atmosphere. The moment computer restarts, press “F8& 8243; key constantly. Now, use the arrow keys to highlight the “Safe Mode with Networking” option, and then press ENTER.
2. Now Open Internet Explorer, click on the ‘Tools menu’ and then select Internet Options.
3. In the Internet Options window click on the ‘Connections’ tab, which would be followed by a click on the LAN settings button.
4. Now you will see Local Area Network (LAN) settings window. Uncheck the checkbox labeled Use a proxy server for your LAN under the Proxy Server section and press OK.
5. To be more protected, download an automatic virus removal tool which you can find online. There are numbers of automatic removal tool available. After downloading a good tool, run the full system scan and remove detected files.
Antivirus Soft manual removal:
Kill processes:
[RANDOM CHARACTERS]sysguard.exe, for example ghrtsysguard.exe [RANDOM CHARACTERS]sftav.exe
HELP:
Delete registry values:
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun “”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun “”
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesAttachments “SaveZoneInformation” = “1& 8243;
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings “ProxyServer” = “http=127.0.0.1:5555& 8243;
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesAssociations “LowRiskFileTypes” = “.exe”
HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerDownload “RunInvalidSignatures” = “1& 8243;
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings “ProxyOverride” = “”
HKEY_CURRENT_USERSoftwareAvScan
HELP:
Delete files:
Windows XP: %UserProfile%\Local Settings\Application Data\\[RANDOM CHARACTERS]sysguard.exe Windows Vista and Windows 7: %UserProfile%\AppData\Local\\[RANDOM CHARACTERS]sysguard.exe %UserProfile%\AppData\Local\\[RANDOM CHARACTERS]sftav.exe
HELP:
Delete directories:
%UserProfile%Local SettingsApplication Data[RANDOM CHARACTERS] (Win XP)
%UserProfile%AppDataLocal\ (Win Vista & 7)