Ipinapakita ang mga post na may etiketa na Viruses. Ipakita ang lahat ng mga post
Ipinapakita ang mga post na may etiketa na Viruses. Ipakita ang lahat ng mga post

Martes, Agosto 16, 2011

SHUT DOWN!

this blog will shut down.... because i will post only in my fan page : http://www.facebook.com/pages/Appzxor-Leon/119205951491515 just go there and like it you are now connected with me

Biyernes, Hulyo 8, 2011

To Those who wants a (PC - Games) and Movies

Hey so you want PC Games and Movies
 Like my Fan Page to get the latest update for (Softwares-Movies-Games)

Fan Page Link : http://www.facebook.com/pages/Appzxor-Leon/119205951491515

Sabado, Mayo 28, 2011

Preventing your Computer from Keyloggers Tips by (Leon26)



Are you scared on keylogger to get hacked???
Ok i will show you how to prevent your computer from Keyloggers

Steps :
1st : If you are not sure if your computer have a keylogger download the Keylogger Detector 

Post Link : http://appzleon.blogspot.com/2011/05/keylogger-detector-v134-by-leon26.html

2nd : If you see that your computer has a Keylogger Scan it with your Antivirus or Internet Securit or any Software that neutralize spyware and malware...

if you dont have Antivirus or Internet Security i Recommend you to use
Malwarebytes or SuperSpyWare they are freeware


Malwarebytes Post Link : http://appzleon.blogspot.com/2011/05/malwarebytes-anti-malware-v1501-final.html

SuperSpyWare Home Page :  http://www.superantispyware.com/superantispywarefreevspro.html

Just Download any of that software..
Scan your Computer with the software you downloaded
Reboot/Restart your Desktop or Laptop if the Software Required...

And That's it Keylogger NEUTRALIZED..
Try to open again the keylogger by pressing the hotkeys
Example : Ctrl + Alt + Shift + Z (That Hotkey is for my keylogger Ecodesoft Keylogger) but i Neutrilized it ahahahah Razz

Tips by (Leon26)

Miyerkules, Mayo 18, 2011

What is Malware??



To Remove Malware i Recommend to you That Use This Following Antivirus or Interent Security :
Bitdefender
Kaspersky
Norton
AVG
Webroot
ESET

You Can Buy Them on their Website..... But if you will buy i will suggest you Bitdefender , Kaspersky or Norton

Dont Have Money to buy them?? Dont Worry There's a Software That You can download for free or buy it... fortunately i can give you a licensed one... by the way it's named Malwarebytes... Click This TEXT to Get Malwarebytes


Malware


Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.
Software is considered to be malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses,worms, trojan horses, spyware, dishonest adware, scareware, crimeware, most rootkits, and other malicious and unwanted software or program. In law, malware is sometimes known as a computer contaminant, for instance in the legal codes of several U.S. states, including California and West Virginia.
Preliminary results from Symantec published in 2008 suggested that "the release rate of malicious code and other unwanted programs may be exceeding that of legitimate software applications." According to F-Secure, "As much malware [was] produced in 2007 as in the previous 20 years altogether." Malware's most common pathway from criminals to users is through the Internet: primarily by e-mail and the World Wide Web.
The prevalence of malware as a vehicle for organized Internet crime, along with the general inability of traditional anti-malware protection platforms (products) to protect against the continuous stream of unique and newly produced malware, has seen the adoption of a new mindset for businesses operating on the Internet: the acknowledgment that some sizable percentage of Internet customers will always be infected for some reason or another, and that they need to continue doing business with infected customers. The result is a greater emphasis on back-office systems designed to spot fraudulent activities associated with advanced malware operating on customers' computers.
On March 29, 2010, Symantec Corporation named Shaoxing, China, as the world's malware capital.
Malware is not the same as defective software, that is, software that has a legitimate purpose but contains harmful bugs. Sometimes, malware is disguised as genuine software, and may come from an official site. Therefore, some security programs, such as McAfee may call malware "potentially unwanted programs" or "PUP". Though a computer virus is malware that can reproduce itself, the term is often used erroneously to refer to the entire category.

What is Trojan horse?



In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. In one celebrated case, a Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus.
The term comes from Greek mythology about the Trojan War, as told in the Aeneid by Virgil and mentioned in the Odyssey by Homer. According to legend, the Greeks
presented the citizens of Troy with a large wooden horse in which they had secretly hidden their warriors. During the night, the warriors emerged from the wooden horse and overran the city.
Getting started with trojan horses

To explore how a Trojan horse might be used against an enterprise, here are some additional resources:
The essentials of malware defense: Prevent malicious access to your machines and systems. Learn the essentials of malware defense, including how to maintain network awareness and best practices for protecting the endpoint.
Protecting browsers from Web advertising attacks: Web browser security is a priority for all enterprises as administrators wor to keep browsers and servers secure. Get more information on Web advertising attacks, learn how hackers exploit websites and servers, and how to minimize the threat.
Ransomware: How to deal with advanced encryption algorithms: Want to avoid a ransomware threat? Learn how to handle advanced encryption algorithms and the best approaches to take when dealing with an attack.

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Powerade Coupons