on site computer support, contract computer support, mobile computer repair on site computer support, computer technicians, computer repair service work at home computer job, in home computer training
All Categories » Spyware and virus removal
What is Malware?
Added by Michael Cummins of Computer Assistant
Monday, March 29, 2010
Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.  The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses. Software is considered malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. ... View More
Difference between Virus and Worms
Added by Michael Cummins of Computer Assistant
Monday, March 29, 2010
The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any other particular behavior. The term computer virus is used for a program that has infected some executable software and that causes that software, when run, to spread the virus to other executable software. Viruses may also contain a payload that performs other actions, often malicious. A worm, on the other hand, is a program that actively transmits itself over a network to infect other computers. It too may carry a payload. These definitions lead to the observation that a virus requires user intervention to spread, whereas a worm spreads automatically. Using this distinction, ... View More
List of new malware threats
Added by Michael Cummins of Computer Assistant
Thursday, April 1, 2010
List of New Threats FakeAlert-WinwebSecurity.b FakeAlert-WinwebSecurity.a FakeAlert-WinwebSecurity JS/Redirector.i Exploit-CVE2008-5353 BlackEnergy Generic BackDoor.u Coreflood!mem FakeAlert-XPAntivirus Artemis!10A4D2BC47D8 BackDoor-ABF Artemis!E9C1481D8414 Generic Downloader.x!dcv W32/Rimecud JS/Redirector.k Generic.dx!oto W32/Hupigon.worm FakeAlert-MK JS/Redirector Generic BackDoor!ccc PWS-OnlineGames.hh W32/Koobface.worm.gen.af W32/Routrobot.worm FakeAlert-AVPsec Generic FakeAlert.a FakeAlert-WwSec FakeAlert-Krypt FakeAlert-MA Exploit-PDF.q.gen!stream Generic PWS.y!bzc
The worst of the worst - Top malware threats on the internet
Added by Michael Cummins of Computer Assistant
Thursday, April 1, 2010
Security Essentials 2010 Security Essentials 2010 is a rogue anti-spyware program and is a predecessor of bogus programs XP Internet Security 2010, Internet Security 2010, Vista Internet Security 2010, Antivir 2010, and Vista Guardian 2010. Security Essentials 2010 is installed onto a user’s computer due to a trojan downloader, mostly found on fake video codec downloads. Once the trojan has infiltrated the computer, Security Essentials 2010 is programmed to begin running at Windows startup, performing a fake scan of the computer and reporting imaginary threat results in order to frighten the user into purchasing the full version of Security Essentials 2010. The bogus program Security Essentials 2010 is not endorsed or ... View More
How Anti-Virus Software Can Help
Added by Michael Cummins of Computer Assistant
Tuesday, April 6, 2010
As malware attacks become more frequent, attention has begun to shift from viruses and spyware protection, to malware protection, and programs have been developed to specifically combat them. Anti-malware programs can combat malware in two ways: They can provide real time protection against the installation of malware software on a computer. This type of spyware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware software and blocks any threats it comes across. Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of malware protection is ... View More
Top Tracked Viruses
Added by Michael Cummins of Computer Assistant
Tuesday, April 6, 2010
  Exploit-ByteVerify Exploit-ObscuredHtml JS/Wonka Generic!atr W32/Sality.gen Generic PWS.ak W32/Conficker.worm!inf W32/Autorun.worm.ev Exploit-PDF.q.gen!stream Bredolab.gen http://home.mcafee.com/VirusInfo/Default.aspx
Mac OS Flashback Virus
Added by Michael Cummins of Computer Assistant
Monday, April 16, 2012
What is the Flashback Virus, and how can it be removed? In early April, a Russian security company reported that as many as 600,000 Macintosh computers were infected with the so-called "Flashback" Trojan Horse virus, which originally appeared in the wild in 2011.  The virus, OSX.Flashback, initially disguising itself as an Adobe Flash Player installer, allows an attacker to secretly obtain remote access to the system by exploiting a current Java vulnerability (BID 52161.) On its blog, US security group Symantec writes, "Malware authors have targeted the Mac OS for quite some time; however, the recent OSX.Flashback.K infections indicate a very significant shift to the current threat landscape, which is dominated by malware on the ... View More
How to keep your computer running well Part 1
Added by Daniel Head of Computer Assistant
Wednesday, September 17, 2014
Anti-VirusBy Daniel M. HeadSeptember 7, 2014 It’s no fun when your computer is running slow, or won’t perform a task it used to. Sometimes, you might have to call a technical support professional like me, to troubleshoot and repair the problem, but there are a number of very easy steps that you can take to keep your computer running smoothly. That’s what this My first suggestion is to download and maintain anti-virus software on your computer. Yes, this is for your own safety, but it’s also being a good neighbor. If your computer gets infected, it can be a door into your entire home or work network, which the bad guys can use to compromise more computers. Your computers can even be used to attack other ... View More