Users tend to call every malicious program a virus, but the dangerous programs encountered these days are rarely viruses in the technical sense. More commonly, they are worms or Trojan horses. The general name for malicious software is malware.
Don't open any attachments! (unless you were expecting to receive one from that person and unless you have scanned the file for viruses.)
- 22 Best Antivirus Software For Windows 10 Home PCs - 2016-05-30
- Dennis Technology Labs - Testing of AntiVirus Software
- MakeUseOf - How Accurate Are These 4 Big Name Virus Scanners? - Recommendations (in order):
- Kaspersky Security Scan - Not free - $$
- AVAST | Free Antivirus Software - $0
- AVG Free | Antivirus - $0
- Malwarebytes | Internet Security Product Downloads - $0
- ZoneAlarm Free Antivirus and Firewall Protection - $0
- Microsoft Safety Scanner - Free Virus Scan - $0
- McAfee Security Scan | Free Virus Scan, Free Virus Protection, Antivirus Software - Not good. No protection at all. - $0
- 7 Free Online Virus Scan Websites - Not good. Avoid all online virus scan Websites
- MS Security Essentials - Installing and Running Microsoft Security Essentials - For Dummies - $0
- Rethinking Antivirus: Executable Analysis in the Network Cloud
- Sunbelt Software's VIPRE - Redefining security software | ZDNet Photo Gallery
- Antivirus Software & Antispyware Software - VIPRE Antivirus + Antispyware
- $50 for unlimited use ("home site license") on your LAN (or $30 per PC) for one year
- 30-day free trial
- very fast; almost no system slowdown
- is it as effective as NIS-2008 or NIS-2009?
- May be better than Kapersky or NIS (except for its missing firewall)
- no firewall included with VIPRE
- $40 ("Unlimited Home site license") for one year (This is a separate purchase from VIPRE.)
- "Comodo Firewall Pro free is significantly better than Sunbelt's Kerio"
- AV-Comparatives Comparatives & Reviews
- Good, but does not evaluate all common anti-virus products.
- Symantec's Norton Internet Security is not included in the most recent evaluations. This is a serious oversight on their part.
- avast! - Download antivirus software for spyware and virus protection - $0
- AVG AntiVirus System - Grisoft.com - Not free
- Free Antivirus Download | AVG - Antivirus Download | Free Virus Protection - $0
- AVG Anti-Virus Free Edition (exe) - Free Downloads on ZDNet - $0
AVG Free Edition is the well-known antivirus protection tool. AVG Free is available free of charge to home users for the life of the product. Rapid virus database updates are available for the lifetime of the product, thereby providing the high level of detection capability that millions of users around the world trust to protect their computers. AVG Free is easy to use and will not slow your system down (low system resource requirements. Highlights include automatic update functionality, the AVG Resident Shield, which provides real-time protection as files are opened and programs are run, free Virus Database Updates for the lifetime of the product, and AVG Virus Vault for safe handling of infected files.Version 8.0.176 may include unspecified updates, enhancements, or bug fixes.
- May not catch all viruses
- AVG Free - Download antivirus and antispyware software for Windows XP and Vista - $0
- Bitdefender Antivirus Software - TotalSecurity.$90/3PCs
- CAI = Computer Associates
- Central Command
- ClamWin Free Antivirus for Microsoft Windows
- Dr.Web - Antivirus & antispam protection.
- ESET NOD32 Antivirus
- Kaspersky Antivirus (AVP) Home, virus scanner, software, alerts ... (US$90.MultiDevice)
- McAfee AntiVirus
- Microsoft ...
- Norton Utilities / Norton AntiVirus / Symantec ...
- Panda Software
- Symantec / Norton Utilities / Norton AntiVirus ...
- Trend Micro USA | Titanium Antivirus + Antispyware – Internet Security - TMIS=$80/3PCs
- Webroot | Next-Gen Cybersecurity & Threat Intelligence | Webroot
- ZoneAlarm by Check Point - Award winning PC Protection, Antivirus, Firewall, Anti-Spyware, Identity Protection, and much more.
- McAfee AntiVirus
- McAfee—Antivirus, Encryption, Firewall, Email Security, Web Security, Risk & Compliance
- MIS=McAfee Internet Security = $80/3PCs
- McAfee.com : Virus Information Library
- McAfee.com - Anti-Virus
- Uninstalling McAfee
- Warning!!! McAfee makes it very difficult to uninstall. McAfee has files scattered all over the hard disk.
- Error: "The specified resource language ID cannot be found in the image file" C:\WINNT\System32\...\avsmcpa.dll
- Solution: delete C:\WINNT\System32\avsmcpa.dll
- Installation & Setup
- Trial Versions
- Danger: If you install an evaluation version (e.g. v98i402e.zip), you will notice the e at the end of the filename. McAfee will not allow you to update the DAT file which includes the latest data required to detect and kill the latest viruses. McAfee hides this in the small print: "You may not, however, update VirusScan evaluation copies ... You will not be able to update your DAT files with the evaluation release." The licensed version has an l (letter L) at the end of the filename (e.g. v98402l.zip).
- McAfee.com (30-day trial, then US$50)
- Patches & Updates & Downloads
- May not catch all viruses (e.g. Klez)
- "We have found that the reason that McAfee runs slow is that there are versions conflicts. Old software remaining McAfee software remaining on the system interfered with the new version. Uninstalling the old software was no easy task. It required manually deleting files and making registry changes. McAfee knows about this. They are the ones who told me what to delete and the new version automatically uninstalls any old software before installing the new." - Lee Trucks - Posted At: 13:45 GMT 2000-10-25
- Don't open any attachments! (unless you were expecting to receive one from that person and unless you have scanned the file for viruses.)
- Ransomware virus scam
- Symantec whitepaper - "Ransomware: A Growing Menace"
- Beware Ransomware | PCMag.com
- While it is colloquially known as ransomware, the virus is called Reveton. It's designated as a drive-by—catchable by just visiting a compromised site.
Reveton works with the Citadel malware platform, which can install other malware so that even after Reveton is removed, keystroke loggers can capture usernames, passwords, and credit card information.
- The malware often announces itself in a pop-up and (wrongly) informs a computer user that their machine has been commandeered by law enforcement for illegal activity. It will not be unlocked, the message says, until a fine is paid. The announcement looks real, but there may be spelling mistakes.
- Do not pay anything! If you pay, you will be asked to pay even more. (MoneyPack/GreenDot, Ucash/PaySafeCard/SmartVoucher, PayPal, etc.)
These criminals will never unlock your computer, no matter how much you pay. Do not contact the crooks.
- DO NOT switch off your computer normally, just hold down the power button or switch it of at the wall.
- Press F8 key while booting. This should bring up the black screen asking if you want it in safe mode. Select 'safe mode with networking'.
- Try to do a system restore to an earlier point in time. (System restore probably won't fix the problem, but it has worked for some people.)
- Remove the hard drive and plug it into another PC as a USB drive, then use an anti-virus program (Norton) to scan it as an external drive.
- Bootable CD solutions:
- Attempt cleanup using a bootable rescue CD, something that many security vendors supply for free. Of course, you'll have to download and burn the CD on a clean system.
Norton Power Eraser is a good example.
- Bootable USB solutions:
- FixMeStick 2013 boots into its own Linux installation and handles scanning for malware automatically; you don't have to interact until you give it permission to clean up what it found.
- HitmanPro 3.7 is specifically designed to fight ransomware.
- Reformat the boot drive. Reinstall the operating system. Since you always do regular backups, you can simply retrieve your data from your backup.
- Heartbleed virus/bug
- Symantec Security Response
W32.Beagle@mm Removal Tool - (Bruin OnLine News Flash Archive)
W32/Bagle.j@MM Virus Alert
- Bruin OnLine News Flash Archive
- Symantec Security Response - W32.Novarg.A@mm
- Symantec Security Response - W32.Novarg.A@mm Removal Tool
- T:\DEPT\McAfee Stinger -- This tool looks for 55 specific virus and Trojans including Mydoom.
- MyDoom worm spreading fast,
Worm creates possessed zombie army to attack SCO website
The MyDoom worm can make a zombie of your computer
The MyDoom worm (also known as Novarg or Mimail-R) spreads via email, using a variety of technical-sounding subject lines and attachment names. If the attached file is launched, and the worm activated, the infected computer's hard disk is harvested by the worm for more email addresses to send itself to. The worm opens a backdoor onto infected computers which allows hackers to gain access.
The worm also spreads via the KaZaA file sharing network, and launches a denial of service (DoS) attack from infected computers (known as "zombies") against SCO's website between 1 and 12 February.
"MyDoom is unlike many other mass-mailing worms we have seen in the past, because it does not try to seduce users into opening the attachment by offering sexy pictures of celebrities or private messages," said Graham Cluley, senior technology consultant for Sophos. "MyDoom can pose as a technical-sounding message, claiming that the email body has been put in an attached file. Of course, if you launch that file you are potentially putting your data and computer straight into the hands of hackers."
"When the MyDoom worm forwards itself via email, it can create its attachment in either Windows executable or Zip file format. It is possible the worm's author did this in an attempt to bypass company filters which try and block EXE files from reaching their users from the outside world," continued Cluley.
- Blaster (msblaster.exe)
- Just being online is enough to get this worm. It doesn't require you to make the mistake of opening an e-mail attachment.
- Buffer Overrun In RPC Interface Could Allow Code Execution (823980). Originally posted: July 16, 2003
- Microsoft Security Bulletin MS03-026 - All Windows users should install this patch immediately.
- Windows Update (http://windowsupdate.microsoft.com/) will install the patch for you, or you can go directly to Microsoft's Web site to install the patch. Be sure to reboot your system after installation is complete.
- Installing the patch is the preferred solution, but if that's not possible, block TCP/UDP ports 4444, 135, 139, and 445 at the firewall to help prevent external exploitation of this vulnerability.
- TechTV | Blast the 'Blaster' Worm
- How to Kill The Blaster Virus--PC Magazine
- Symantec.com (Norton)
- service = server (e.g. Web server = HTTP server)
- ports = sockets
- Beware of Bugbear worm
Bugbear arrives via e-mail with no distinct characteristics except for an attached file that is always 50,688 bytes long. It attempts to steal passwords and credit card numbers.
- Kazaa by Brilliant Digital Entertainment will make you unwittingly install software that will turn your computer into nodes for a peer-to-peer network controlled by another company April 18, 2002
- Nimba Worm - Microsoft TechNet (admiN)
- Code Red & Nimda ...
- ILOVEYOU On the Loose
- Viruses are often delivered with e-mail attachments. Even if you know the sender, the attachment may contain a virus. You must keep your virus protection software data files up-to-date and always scan all attachments. An even safer (but extreme) solution is to refuse to open any e-mail attachment.
- E-mail Attachments commonly use these filename extensions to spread viruses:
- *.bat, *.com, *.exe, *.pif, *.scr, *.vbs, *.doc, etc...