Archive

Archive for the ‘computer security’ Category

Delete an Undeletable file

Ever had such an annoying message given by Windows?

It has many other flavors: Cannot delete file: Access is denied There has been a sharing violation. The source or destination file may be in use. The file is in use by another program or user. Make sure the disk is not full or write-protected and that the file is not currently in use.

Method 1
Open a Command Prompt window and leave it open.
Close all open programs.
Click Start, Run and enter TASKMGR.EXE
Go to the Processes tab and End Process on Explorer.exe.
Leave Task Manager open.
Go back to the command prompt window and change to the directory the AVI (or other undeletable file) is located in.
At the command prompt type DEL <filename> where <filename> is the file you wish to delete.
Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the GUI shell.
Close Task Manager.
Method 2
You can try this
Open Notepad.exe
Click File>Save As..>
locate the folder where ur undeletable file is
Choose ‘All files’ from the file type box
click once on the file u wanna delete so its name appears in the ‘filename’ box
put a ” at the start and end of the filename
(the filename should have the extension of the undeletable file so it will overwrite it)
click save,
It should ask u to overwrite the existing file, choose yes and u can delete it as normal

Method 3

Here’s a manual way of doing it.
1. Start
2. Run
3. Type: command
4. To move into a directory type: cd c:\<<path of your folder>>
5. If you cannot access the folder because it has spaces for example Program Files or Kazaa Lite folder you have to do the following. instead of typing in the full folder name only take the first 6 letters then put a ~ and then 1 without spaces. Example: cd c:\progra~1\kazaal~1
6. Once your in the folder the non-deletable file it in type in dir – a list will come up with everything inside.
7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc… And if the file name has spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule. Example: if your file name was bad file.bmp you would type once in the specific folder thorugh command, del badfil~1.bmp and your file should be gone. Make sure to type in the correct extension.

Method 4
Download Unlocker from Here .
Install it .Now go to folder where the “Undeletable” file is located.

    1. Simply right click the folder or file and select Unlocker

    2. If the folder or file is locked, a window listing of lockers will appear

    3. Simply click Unlock All and you are done! Enjoy !!!

Task Manager disabled – Fix it!!

Many times when working on a computer that has been infected with a virus, Trojan, or piece of spyware I find myself Task Manager ca be disabled=with the Task Manager being disabled. Its the first priority of Malware creators to disable access to Task manager so that the user is not able to end the process of the running Malware.Until or unless you are working in an office,there is  seldom any restriction placed over Task manager by home users.So, I will be mentioning 5 methods to re-enable task manager and restore it to former glory.


To open the Task Manager, you normally would do one of the following:

  • Press CTRL-ALT-DEL on the keyboard.
  • Press CTRL-SHIFT-ESC on the keyboard.
  • Right-click on a blank area on the start bar and choose Task Manager.
  • Click on Start, Run and type TASKMGR in the run box and press Enter .

And if instead of opening of Task manager you see the screen given below,then you need to re-enable the task manager..

Task manager has been disabled=

First we’ll begin with the various registry modification methods for correcting this problem.

Method 1

  • Using the Group Policy Editor in Windows XP Professional .
  • Click Start, Run, type gpedit.msc and click OK.
  • Under User Configuration, Click on the plus (+) next to Administrative Templates.
  • Click on the plus (+) next System, then click on Ctrl+Alt+Delete Options.
  • Find Remove Task Manager in the right-hand pane and double click on it.
  • Choose the option Not Configured and click Ok.
  • Close the Group Policy Window .

Method 2

  • Change the Task Manager Option through the Run line .
  • Click on Start, Run and type the following command exactly and press Enter.

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 0 /f

It will restore your task manager and resolve your problem.

Method 3

  • Change Task Manager through a Registry REG file .
  • Click on Start, Run, and type Notepad and press Enter.
  • Copy and paste the given code into Notepad and save it to your desktop as taskmanager.reg

Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
“DisableTaskMgr”=dword:00000000

  • Double click on the taskmanager.reg file to enter the information into the Windows registry.

Method 4
Delete the restriction in the registry manually

  • Click on Start, Run, and type REGEDIT and press Enter.
  • Navigate to the following branch

HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies\ System

  • In the right pane, find and delete the value named DisableTaskMgr.
  • Close the registry editor .

Method 5

  • Download and Run FixTaskManager program.
  • Click on the following links and download the program FixTaskManager to your Desktop

Click here to Download Fixtaskmanager - rdhacker.blogspot.com

  • Double-click on the file FixTaskManager on your desktop and run it .
  • This will restore your Task manager.

I hope that was informative.

Remove Regsvr.exe and Newfolder.exe viruses completely from your computer

Plug a pendrive into a public computer and you will be pesked by the continuously replicating “New Folder.exe” virus or Remove REGSVR.EXE and New Folder.exe viruses completely - thrprohack.comthe “regsvr.exe” virus. Here is how you can remove “regsvr.exe” and “new folder.exe” from your computer.

Step 1 – Some Startup Repairs

First of all, boot into safe mode.After you get to your desktop,press F3 or Ctrl + F and search for “autorun.inf” file in your computer and delete all the subsequent files. I case you are no able to delete them, select all the files and uncheck the”Read Only” option. If you are still not able to delete them , you might want to try out Unlocker tool to delete the files.

Now go to

start – > run –> type ”msconfig

and press enter

Go to startup tab and uncheck “regsvr”, click ok and then click on “Exit without restart”.

Now go to

control panel –> scheduled tasks and delete “At1” task listed there.

Once done, close all windows.

Step 2 – Changing Configurations

Your registry might be disabled,and you need to activate it back to undo all the malicious changes done by worm.In order to do that, you need to go to

start – > run –> type ”gpedit.msc

and press enter

then navigate to

users configuration –> Administrative templates –> systems

Find “prevent access to registry editing tools” , double click it and change the option to disable.

you need to enable regedit using gpedit - theprohack.com

Once done, your Regedit will be enabled. In case your task manager is disabled, you need to enable it. read my article on how to enable the disabled task manager.

Step 3 – Registry Edits

Now we have to perform some registry edits to enable our explorer and to remove all instances of worm from the registry. Go to

start – > run –> type ”regedit

and press enter

Click on Edit –> Find and search for regsvr.exe . Find and delete all the occurrences of regsvr.exe virus (don’t delete  regsvr32.exe as its not a virus).

then navigate to entry

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon

and modify the entry

Shell = “Explorer.exe regsvr.exe”

You need to remove regsvr from registry - theprohack.com

to delete the regsvr.exe from it,so that it becomes

Shell = “Explorer.exe

Once done, close all windows and get ready to delete all virus files.

Step 4 – Deleting Virus Files

The final step is to delete all the virus files in your computer. To do this, Press F3 or Ctrl + F and search for regsvr.exe (make sure to search in hidden folders ) and delete all “regsvr.exe” “svchost .exe” files (notice the gap between ‘svchost’ and ‘.exe’, keep in mind you don’t delete the legitimate file.).

Clean your recycle bin and restart your PC (perform a cold boot).

yeah….you have cleaned your computer from regsvr…just make sure to scan your pendrive the next time you plug in 🙂


How to block website manually?

Some times it becomes necessary to block a website on our Computers for one or other reason. You can easily and effectivily block access to a website by adding it to your Windows HOSTS file. Once the website is blocked in the HOSTS file, it will not appear in any of the browsers. That is, the website becomes completely unavailable.

1. Go to your HOSTS file which is located at:

C:\WINDOWS\SYSTEM32\DRIVERS\ETC for Vista and XP
C:\WINNT\SYSTEM32\DRIVERS\ETC for Win 2000
C:\WINDOWS for Windows 98 and ME

2. Open HOSTS with Notepad.

The default Windows HOSTS looks like this:
______________________

# Copyright © 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a “#” symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
#
127.0.0.1 localhost

3. Directly under the line that says 127.0.0.1 Localhost, you will want to type:

127.0.0.1 name of the URL you want to block

For example to block the website MySpace.com, simply type:

127.0.0.1 myspace.com
127.0.0.1 http://www.myspace.com

Other parts of MySpace could be blocked in a similar way:

127.0.0.1 search.myspace.com
127.0.0.1 profile.myspace.com
etc etc etc…

It is necessary to add a website with and without the “www.”. You can add any number of websites to this list.

4. Close Notepad and answer “Yes” when prompted.

5. After blocking the website, test it in any of the browser. If every thing is done as said above,the website must not appear in any of the web browsers. You should see a Cannot find server or DNS Error saying: “The page cannot be displayed”. I have also created a virus to block a website which automatically blocks a list of websites as specified in the source program.

Some people may suggest you to add a website to the Internet Explorer ‘Privacy’ settings. This does not block a site. It only stops that site from using cookies.

How to remove MSN virus

[msnvirus.jpg]

MSN messages like the above title, some goes by “Is that you on that photo…” or similar has been popping on my Instance Messenger on daily basis. If you are receiving these messages like I do, that means your friend on the other end has been infected by a MSN virus. I not sure if its deadly, but it’s sure disturbing.

These viruses goes by various names, MSN Virus Project 1; Generic2.EXO; Backdoor.Generic3.SAT. Once infected it will spread across your contact lists and sends out the above said (or similar message). If any of your IM contacts clicks on it, they will be brought via Internet Explorer to download a file name photo656.pif. If the user downloads it, there goes another users.

PROCEDURE TO REMOVE MSN VIRUS::

Follow the steps to remove MSN virus/ Generic2.EXO / Backdoor.Generic3.S

Uninstall MSN messenger.
Go to Start > Control Panel > Add/Remove Programs.
Find Toolbar888 and uninstall it
Press CTRL+ALT+DELETE
Just end the following process(if you cant find all of them, don’t worry, just end the processes that are found):
Update.exe
goll.exe
loadadv455.exe
drsmartload.exe
goll.exe
two.exe
vcncr.exe
rorjxk.exe
eyewblbby.exe
cgqrvrva.exe

Now Delete the Following Folders :

C:\Program Files\Common Files\{28676FB5-0AE9-3081-1205-03030930003d}\
C:\Program Files\Common Files\{38676FB5-0AE9-3081-1205-03030930003d}\
Search and delete all occurances of the following files(dont worry if you dont all of these).
goll.exe
drv.exe
loadadv455.exe
one.exe
two.exe
The files are found in
“C:\Windows\system32\”
“C:\Documents and Settings\[current user] ” ( [current user] is the name you are currently logged on as)
“C”:\ (be careful what you delete here)
Scan your computer with a AV. Now all that you may need to reinstall MSN Messenger again.
So this is how msn virus can be removed.

How to fix your infected computer

IS your PC infected by virus,spyware etc?,Does your pc much takes time to start?,Are you looking for tools to fix up your infected computer then this post is just for you,
I get this question getting asked frequently,”How to fix your infected computer”,I have posted here many ways to fix your infected computer and Make it start faster.

Steps to fix your Infected computer:

Here are some steps you need to take when fixing your infected computer:

Antivirus software

1.Kaspersky:

It is one of the best antivirus availible on web,Kaspersky Anti-Virus features include real-time protection, detection and removal of viruses, trojans, worms, spyware, adware, keyloggers malicious tools and Auto-Dialers, as well as detection and removal of rootkits. It also includes instantaneous automatic updates via the “Kaspersky Security Network” service.

2.Avira

Avira uses very less CPU and is quite compact.Avira free is much better than Avira Premium even though it offers web filter and mail filter

3.AVG
AVG is one of the most used antiviruses now a days,most of all its free and antispyware too,It is very light and does not acquire too much disk space

4.
Norton
Quite slow if you have a 512 MB or 1GB RAM.2GB and 3 GB RAM Users are only advised to use this software.But it is extremely good in virus detection and does not leave a single trace of any damage,It detects 90% of viruses but not better than kaspersky.

Antispyware:

Spyware is a type of malware that is installed on computers and that collects information about users without their knowledge. The presence of spyware is typically hidden from the user. Typically, spyware is secretly installed on the user’s personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.

Antispware is the second step in to fix your infected computer.Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user’s computer

Here is a list of some antispywares which i would recommend:

1.Ad-Aware Free Anniversary Edition 8.0.7:
It eliminates spy archives and him easily aid to eliminate them of fast form. It can choose the modules to eliminate, to keep files from registry, and to personalize the menu of the program

2.a-squared Free 4.5.0.8:
Also known like a², one specializes in detecting, to eliminate malwares (all type of harmful file). To the day of today, a-squared detects and eliminates more of: 24.000 trojans, 67.000 worms, 40.000 dialers, 11.000 spyware y 70.000 plans or signs.

3
.Malwarebytes Anti-Malware:
This antispy analyzes the discs in search of malware With option to eliminating them. This antispy can be programmed to analyze PC at a certain hour. It has a list for files in quarantine and to ignoring. There exists the possibility of activating the protection in real time (Itdetects the threats before that enter to the system), which, it is of payment.

Others are such as spyware blaster,spy defence etc.

Registry scanner:

Next you need a registry scanner, to fix your infected computer,Viruses often copy their algorithm into the registry entry.So you are only 50% done after you delete the virus)
Well there are many registry cleaners availible such as

1.Eusing Free Registry Cleaner/scanner
2.Registry fix
3.Auslogics registry cleaner(My recommendation)

Trojan horse removal:

For this you can read my post on “Trojan horse removal

Ccleaner:

After that you can download CCleaner and optimize your computer speed by deleting unwanted registry and internet tracing cookies and temporary files.

note:Anti-Malware Toolkit – a program that automatically downloads all of the recommended programs to help users clean their computers and have them running at peak performance again.

Help keep your computer safe, secure and clean from malware – get the Anti-Malware Toolkit today!

Download anti malware tool kit here



Categories: computer security

Securing Network from Trojans

Types of Trojans:

1.Remote Access Trojans

2.Password Sending Trojans







How to Get Rid of Trojans:
Here are some practical tips to avoid getting infected.

  1. NEVER download blindly from people or sites which you aren’t 100% sure about. In other words, as the old saying goes, don’t accept candy from strangers. If you do a lot of file downloading, it’s often just a matter of time before you fall victim to a trojan.
  2. Even if the file comes from a friend, you still must be sure what the file is before opening it, because many trojans will automatically try to spread themselves to friends in an email address book or on an IRC channel. There is seldom reason for a friend to send you a file that you didn’t ask for. When in doubt, ask them first, and scan the attachment with a fully updated anti-virus program.
  3. Beware of hidden file extensions! Windows by default hides the last extension of a file, so that innocuous-looking “susie.jpg” might really be “susie.jpg.exe” – an executable trojan! To reduce the chances of being tricked, unhide those pesky extensions.
  4. NEVER use features in your programs that automatically get or preview files. Those features may seem convenient, but they let anybody send you anything which is extremely reckless. For example, never turn on “auto DCC get” in mIRC, instead ALWAYS screen every single file you get manually. Likewise, disable the preview mode in Outlook and other email programs.
  5. Never blindly type commands that others tell you to type, or go to web addresses mentioned by strangers, or run pre-fabricated programs or scripts (not even popular ones). If you do so, you are potentially trusting a stranger with control over your computer, which can lead to trojan infection or other serious harm.
  6. Don’t be lulled into a false sense of security just because you run anti-virus programs. Those do not protect perfectly against many viruses and trojans, even when fully up to date. Anti-virus programs should not be your front line of security, but instead they serve as a backup in case something sneaks onto your computer.
  7. Finally, don’t download an executable program just to “check it out” – if it’s a trojan, the first time you run it, you will be infected!
To manually remove trojan from your computer read my article on Removing Trojan horse manually.

Removing Trojan horse manually

A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user’s computer system.

Is trojan virus Dangerous?

The short answer is yes, and the long answer is sometimes, because there are near a thousand different trojan horse viruses and they all will most likely alter your computer in some way or another.

WORKING OF TROJANS::

https://i0.wp.com/4.bp.blogspot.com/_fMrF3L8CTmg/S_D_tQ7wf3I/AAAAAAAAAdw/1KS6PwqdKVY/s1600/working-of-trojan.jpg
In this tutorial i will tell you a method through which you can manually remove a Trojan horse,Sometimes  a trojan horse disables your antivirus and prevent any other Antivirus from being installed.

1-Go to my computer
2-Drive c
3-Program Files
4-Common flies
5-Microsoft shared
6- Ms info or msinfo 32


The virus might hide it self in startup so delete the temporarily internet file.

Is there any way to prevent Trojan attack?
I have wrote an article on securing network from trojans this will explain on How to keep Trojans out of your PC.

Protecting computer against Spywares and Keyloggers

Most of people frequently ask me on How to protect computer against Spywares and Keyloggers, Spywares like Sniperspy and Remote spy are almost undetectble by an antivirus program,to protect your computer against these harmful spyware,Rats and keyloggers you need to install a good antispyware program.

The following are some of the major risks of Spywares.

1.Spyware programs are designed specifically to monitor and record your behaviors, such as track websites you visit online, or monitor your use of other web-based programs.

2.Hackers mainly use spywares to steal sensitive information such as email passwords and credit card data. So it is a must to have an anti-spyware installed on yourcomputer. Antivirus isn’t just enough today!

3.Spyware is also capable of performing activities such as completely shutting down your computer, or permanently erasing or damaging files. Valuable client files could be destroyed in a blink of an eye, making this type of spyware threat high-risk.

Spywares are more dangerous than viruses so which antispyware software to choose?

1.spyware cease::
Spywares are more dangerous than viruses so which antispyware software to choose?https://i0.wp.com/www.hdrmut.net/vb/imgcache/2/28889alsh3er.png

Spyware Cease offers the technology-oriented protection against the latest spyware threats like keyloggers, Trojans, adware, malicious cookies tracking, browser hijackers, worms, phishing attacks and other malicious Internet Tracks & Password Thieves Cleaner One simple click to delete malicious cookies from your computer system so as to clear Internet Tracks completely and minimize password thieves to protect your privacy!spyware attacks.
Download the Spyware cease software from the spyware cease official website.
2.NoAdware::
https://i0.wp.com/www.adware-source.com/img/noadware_box.jpg
Another alternative to Spyware cease is NoAdware,it is constantly updated to identify the latest threats to your privacy. The software will scan your PC for different Spyware, Adware, Dialers, and Web Bug traces. These items not only create nuisances in the form of popups, system slowdowns and crashes, but many items actually record personal information about you, such as credit cards, social security numbers, or other sensitive information.
Visit the official website for more information about this product and Download.
3.Zemana Antilogger::

https://i0.wp.com/i40.tinypic.com/jv5250.jpg

Zemana AntiLogger now covers pretty much every aspect of Windows including registry modification and dll injection prevention and protects Windows from other spyware-related techniques with Anti-Keylogger, Anti-SreeenLogger, Anti-WebLogger and Anti-ClipboardLogger tools of its own. Another useful feature this apps has is while-list approach (in contrast to Anti-Virus blacklist approach) meaning it automatically recognizes “safe” programs and does not treat them as “suspects”.My words on Zemana Antilogger. Grab it and do yourself a favor. Although with a similar goal like majority of Anti-Virus apps, this little utility offers much more advanced and differentapproach to protect one’s computer from malware.

check the official site for more information about this product and Download.


Hiding the IP address of the computer

Your IP is exposed when ever you visit a website,when your Ip gets exposed it becomes easy to trace you and find out your personal information,Hackers can use your Ip to gain access to your personal files and documents and even can get into your paypal,alert accounts etc. Hide the IP is a Software which masks your IP with one click and you can surf web anonymously,on the other hand Hackers can use this software to hide theiridentity and not get caught,its benificial for all and i recommend that every Pc should have this software installed.

Hide the IP to be the best one. It’s ease of usereliabilitywide range of optionsspeed and unmatchable price were on top when compared to that of the remaining IP Hising softwares on the market.

Key Features of Hide the IP:

HIDE IP ADDRESS::

Single click to completely hide your Online Identity. Others will see a fake IP address masking your real IP, thus, protecting your privacy.

SELECT YOUR PHYSICAL IP LOCATION::

You decide which country will be indicated as your origin by simply choosing from a country list. We have hundreds, hourly updated, IP addresses available for use.

ANONYMOUS WEB SURFING::

You are protected from hackers who will be tricked by your fake IP instead of your real. They will never be able to find any information about you by tracing the fake IP. Send Anonymous E-mails » Hide your IP in E-mail headers. Be protected while sending emails from Yahoo!, Hotmail, GMail. Upgrading to Platinum Service add-on will protect you in Outlook!

BYEPASS WEBSITE COUNTRY RESTRICTIONS::

Surf websites which are restricted for your country. Surf in forums on which you were banned.

Supports Internet Explorer, Firefox, Google Chrome, Safari, Opera.

So what are you waiting for? Download the free trial and test Hide the IP on your computer now! For more information on Hide the IP visit the following link.
Categories: computer security