Tag Archives: program

The 5 Most Common Types of Viruses

Computer viruses are those malicious programs that once they infect your computer, they will start causing mass destruction to your PC. Similar to biological viruses, they can multiply in various ways and develop from one type to another. Since there are hundreds of viruses out there, here are the five basic types of viruses that people are most likely to encounter, in order to make the identifying process easier.

• Trojan Virus
• Worms
• Macro Virus
• Boot Sector Virus
• File Infector Virus

Trojan Virus – This virus appears to be nothing more than an interesting computer program or file of a user who’s interested in collecting audio files. Once this virus enters your computer, it doesn’t reproduce, but instead makes your computer vulnerable to malicious intruders by allowing them to access and read your files. A Trojan horse must be sent by someone or carried by a program or software of some sort. The malicious functionality of a Trojan horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.

Worm – A Worm is a virus program that copies and multiplies itself by using computer networks and security flaws. Worms are more complex than Trojan viruses, I should say, and usually attacks multi-user systems. It can spread over corporate networks via the circulation of emails. Once multiplied, the copied worms scan the network for further escape and will then cause errors on the network.

Macro Virus – This type of virus usually comes as part of a document or spreadsheet, more often found in an email. Many of the current macro viruses are written in this language and attached to Word documents. This capability is powerful, but allows viruses to be written and executed much more easily than by using other methods.

Boot Sector Virus – A virus which attaches itself to the first part of the hard disk that is read by the computer upon start up, which are normally spread by floppy disks. In time, they can spread to other readable disks. Booting problems and start up problems, problems with retrieving data, computer performance instability and the inability to locate hard drives are all issues that may arise due to a boot sector virus infection.

File Infector Virus – As the name indicates, this type of virus was designed to avoid detection by antivirus software by changing itself internally. Upon running a program that has been corrupted by a file infector, the virus copies the malicious code and applies it to other executable applications on the computer. Files that are the most vulnerable to this type of infection have the extensions of EXE. and .COM, though any file is capable of execution can be infected.

How to fight some of these viruses is still completely a puzzle for anti-virus makers. However, knowing a little about your enemies could be an advantage to get vital information on how to defend your computer from those threats. Read on Virus Removal Help – How to Remove Viruses Easily From Your PC? in order to become more familiar with the steps on how to remove the common types of viruses from your computer.

CSV Converter Converts CSV to Other File Types with Outstanding Accuracy

We often need to move data from one format to the other. Take CSV for example. too often we need to export CSV to other file types to load that file to an application that does not support CSV, or it is just convenient for editing. But what’s a user to do? Until recently,we had to buy several specialized software packages to export to other formats, which was expensive. Also you could re-enter all data from a CSV database to a file in a new format but that would be too hard and require too many efforts. Hopefully, all of that is eliminated.

CSV Converter lets the user convert CSV to nine popular formats, such as DBF (Dbase III/IV, Visual Foxpro) , Excel (XLS,XLSX), TXT, HTML, PRG, XML, SQL, and RTF. To export a file, you just need to choose the source database, the target format and output directory. If there is anything in a CSV database that you do not want to be exported, the program allows you to set a filter by example and choose columns to exclude from the conversion, which gives flexibility in defining output database parameters. Once everything is set and configured, the next step is to start the process, which is only one click. The program intelligently parses the source database, converts all data to a li
st of data fields and saves the output to the output folder. All of this happens without requiring your attention. Also no external drivers such as ODBC or BDE are required. Claimed accuracy is around 100 %.

Advanced CSV Converter requires no learning after the installation. The user can begin your first CSV conversion right after the installation thanks to the wizard-driven interface that guides you through all the stages of the setup process in a step-by-step manner. In addition to exporting a single file, the user can also run a batch conversion of more than one file in one go. For this purpose, the user should select the folder with CSV files as the source, configure export parameters and start the conversion. Also although most people prefer to use the GUI user interface, some advanced users may prefer to do conversion from the command line, and the program provides support for this function too.

Once you try, you’re going to see that Advanced CSV Converter provides an easy and inexpensive solution to converting your data from CSV to other formats. The program runs on all versions of Windows, including Vista and Windows 7 (32/64-bit).

How to Remove Security Essentials 2010

Security Essential 2010 is a rogue anti-spyware program from the family of Internet Security 2010. This malware is installed in PC by Trojans which pretend to be Flash update claiming to be an essential software to view video online. When a user clicks on this so-called ‘Flash Update’ program, instead of helping in watching videos online, it installs other malware and spyware in the PC.

As an example – C:WINDOWSsystem32smss32.exe is a similar Trojan that hijacks desktop with security warning, displays pop-ups with messages ‘you are infected’ which are actually fake messages. And at last it installs Security Essentials 2010.

While Security Essentials 2010 is running, you will be shown nag screens and fake security warnings from Windows task bar. Some of the warnings:

System Warning:
. Continue working in unprotected mode is very dangerous.
. Viruses can damage your confidential data and work on your computer.
. Click here to protect your computer.
. Intercepting programs that may compromise your privacy and harm your system have been detected on your PC.
. It’s highly recommended you scan your PC right now.

Danger quotient – Once Security Essentials 2010 gets installed on your PC, it automatically starts updating itself the moment you logs in. This also shows off pop-ups stating about numerous infections on your PC. When you try to uninstall of remove this program, it flaunts a message that says “you need to purchase the program first in order to remove it.” But all such messages are fraudulent acts which at the end of the day result in your loss.

Security Essentials 2010 files and registry values:

Files:
. C:WINDOWSsystem32warnings.html
. C:WINDOWSsystem32helpers32.dll
. C:WINDOWSsystem32winlogon32.exe
. C:WINDOWSsystem32smss32.exe
. C:WINDOWSsystem3241.exe
. %Temp%250904.exe
. %StartMenu%Security essentials 2010.lnk
. %Desktop%Security essentials 2010.lnk
. C:ProgramFilesSecurityessentials2010SE2010.exe

Registry keys and values:

. HKEY_CURRENT_USERSoftwareSE2010
. HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun
. “Security essentials 2010”
. HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun “smss32.exe”

How to remove it – There are many steps that can be conducted to remove security Essentials 2010 from your PC.

1. Reboot your computer is “Safe Mode with Networking”. As the computer is booting tap the “F8 key” continuously which should bring up the “Windows Advanced Options Menu” as shown below. Use your arrow keys to move to “Safe Mode with Networking” and press Enter key.

2. Download one of the good and legitimate anti-malware applications and run a quick system scan. Don’t forget to update it first. All programs a free.