Mengesan Ancaman Malware

Malware merupakan perisian yang direka bentuk untuk memasuki ke dalam sistem komputer dan menyebabkan resiko kerosakan komputer tanpa disedari oleh pengguna.

Nama Malware wujud daripada gabungan ‘malicius’ yang membawa maksud niat jahat dan ‘software’ pula bermaksud perisian. Perisian ini dicipta oleh individu yang mempunyai kepakaran berkenaan kod program pelbagai perisian. Tujuan golongan ini ialah untuk mengganggu, mengancam dan menimbulkan masalah kepada pengguna komputer. Mereka mencipta Malware seperti cecacing internet dan beberapa virus lain bagi tujuan untuk menguji kemahiran komputer yang dimiliki serta ingin melihat sejauh mana kejayaan mereka menyebarkan virus yang dicipta.

Salah satu Malware yang mula-mula disebarkan adalah cecacing yang telah direka oleh seorang pelajar Cornell University, Robert Morris pada tahun 1998. Tujuan asalnya ialah untuk latihan bagi menguji dan mengukur saiz Internet. Namun telah berlaku kesilapan dalam pengekodan menyebabkan cecacing tersebut telah berupaya menyalin semula dan tersebar meluas ke beribu-ribu komputer di seluruh dunia.

Pada masa ini Malware diwujudkan untuk tujuan mengaut keuntungan. Bukan saja untuk mengganggu sistem komputer tetapi ia juga digunakan untuk mencuri data, identiti, wang serta maklumat pengguna, semata-mata bagi mengaut keuntungan yang berlipat ganda oleh penjenayah siber.

Pengguna selalunya tidak sedar, bahawa sebahagian perisian yang dimuat turun dari internet yang digunakan sebenarnya adalah merbahaya kerana penyamaran yang dilakukan. Teknik inilah yang telah digunakan oleh kebanyakan virus trojen. Teknik yang dikenali sebagai ‘rootkits’ menawarkan penyembunyian Malware daripada pengetahuan pengguna dan menghalang daripada dikesan oleh program anti virus.

Kemunculan lebih banyak rangkaian sosial seperti YouTube, MySpace dan sebagainya akan menggalakkan lagi penyebaran Malware. Penyebaran ini juga boleh berlaku melalui pautan pada ruangan forum, sembang talian, pautan video dan ruangan berita.

Malware akan menyebabkan sistem komputer bertambah lambat seperti penyambungan Internet dan juga masa untuk sistem ‘boot’ menjalankan operasinya

Untuk mengesan malware kita memerlukan software yang dapat mengesan kehadiran malware dalam komputer`.Salah satu software yang boleh digunakan secara percuma adalah Prevx CSI - Free Malware Scanner.Software ini boleh di download dan diguna secara percuma dan boleh digunakan pada Windows XP, Vista, 2003, 2000 SP4 .Terdapat banyak lagi software yang boleh digunakan secara percuma tetapi harus berhati-hati kerana sesetengah software tersebut adalah “perangkap samar”.Jika anda search keyword malware scan , malware scanner atau free malware scanner di enjin carian google sebagai contoh , memang banyak link yang menceritakan kisah suka duka malware.Akhir sekali dari saya hidup komputer tanpa malware. Read More......

How to faster shut down computer ?

Ramai pengguna komputer termasuk saya selalu mengeluh mengapa komputer mengambil masa terlalu lama untuk shut down.”Malas a nak tunggu” secara tidak langsung anda meningalkan komputer tanpa off suis power.Inilah salah satu penyebab mengapa ramai yang tidak off power utama ke komputer.Sedangkan dengan off kan suis utama dapat memanjangkan hayat peralatan komputer dan menjimatkan bil api elektrik.

Mengikut ilmu dan pengalaman saya , masa yang diambil oleh internet komputer untuk shut down bergantung kepada hardware dan aplication yang sedang runing.Jika komputer anda berkuasa kuda tinggi dari segi CPU dan RAM , masa yang diambil untuk shut down lebih laju dari komputer yang hardware berkuasa rendah.Aplication yang sedang running juga mempengaruhi masa yang diambil untuk shut down.Semakin banyak aplication sedang runing semakin lama masa diambil.

Hari ini saya akan kongsi satu tip untuk melajukan proses shut down komputer anda.Anda hanya perlu membuat sedikit perubahan pada setting di system registry..Apa yang perlu anda lakukan adalah ubah value data pada AutoEndTasks dan WaitToKillAppTimeout.Double klik pada AutoEndTask dan ubah nilai 0 kepada 1000 dan value data WaitToKillAppTimeout dari 2000 kepada 5000.Selepas itu restart komputer anda dan lihat perbezaan. Read More......

Cisco − Resolving Microsoft Routing Problems on Cisco VPN Clients

icrosoft routing problems can occur when a Cisco VPN Client (VPN 3000 Client, Cisco Secure VPN Client, or VPN 5000 Client) gets an IP address from the device terminating the tunnel (Cisco VPN 3000 Concentrator, router, PIX Firewall, or VPN 5000 Concentrator) that is on the same network as the local Network Interface Card (NIC). This can occur if a user has a laptop on the corporate network with a Dynamic Host Configuration Protocol (DHCP) or static IP address (10.50.1.x), brings the laptop home, dials into an Internet Service Provider (ISP) and connects using the VPN Client.

If the terminating device sends the VPN Client an IP address that is on the same network (10.50.1.x), the user cannot send any data over the client connection. The packets are sent to the NIC, instead of over the VPN connection, because the traffic is still routed out of the NIC. This problem occurs on Microsoft Windows 95, Windows 98, and Windows NT 4.0.

Symptoms of this problem are that the VPN tunnel comes up, but the PC cannot pass traffic. A route print command still shows the DHCP or static address, or both. If the IP address was received through DHCP, the DHCP lease can be manually released.

The Cisco VPN Client can be preconfigured for mass deployments, and initial logins require little user intervention. It supports the innovative Cisco Easy VPN capabilities, delivering a uniquely scalable, cost-effective, and easy-to-manage remote access VPN architecture that eliminates the operational costs associated with maintaining a consistent policy and key management method. The Cisco Easy VPN feature allows the Cisco VPN Client to receive security policies upon a VPN tunnel connection from the central site VPN device (Cisco Easy VPN Server), minimizing
configuration requirements at the remote location. This simple and highly scalable solution is ideal for large remote access deployments where it is impractical to individually configure policies for multiple remote PCs. Read More......

Cisco − Resolving Microsoft Routing Problems on Cisco VPN Clients

icrosoft routing problems can occur when a Cisco VPN Client (VPN 3000 Client, Cisco Secure VPN Client, or VPN 5000 Client) gets an IP address from the device terminating the tunnel (Cisco VPN 3000 Concentrator, router, PIX Firewall, or VPN 5000 Concentrator) that is on the same network as the local Network Interface Card (NIC). This can occur if a user has a laptop on the corporate network with a Dynamic Host Configuration Protocol (DHCP) or static IP address (10.50.1.x), brings the laptop home, dials into an Internet Service Provider (ISP) and connects using the VPN Client.

If the terminating device sends the VPN Client an IP address that is on the same network (10.50.1.x), the user cannot send any data over the client connection. The packets are sent to the NIC, instead of over the VPN connection, because the traffic is still routed out of the NIC. This problem occurs on Microsoft Windows 95, Windows 98, and Windows NT 4.0.

Symptoms of this problem are that the VPN tunnel comes up, but the PC cannot pass traffic. A route print command still shows the DHCP or static address, or both. If the IP address was received through DHCP, the DHCP lease can be manually released. Read More......

Money Out of E-mail Marketing

How can e-mail marketing generate income to an individual?

Penetrating e-mail marketing requires not much from you. It actually entails very simple things: have patience, motivate yourself to work to the fullest and a few simple tips to bring onto your pocket and voila! You are all set!

To ensure that you get what you want you have to have a powerful material to equate your goal. Since the e-mail marketing requires that one should develop an e-mail to be sent out to potentially large market, then it is a must that the e-mail material is written at its best. Remember that your objective is to attract prospective consumers and catch their attention to at least consider buying or patronizing your product. Apparently, the medium that you have handicaps you from verbally catching the consumer, then it is just but right to put out the best e-mail material campaign. The e-mail leaves all the impression without you knowing it. Only when you are able to capture that market can you say that you have been successful in marketing the product. So, the rule is, give the best content you can think of in the e-mail!

Now, you have completed your campaign material. The next question is: Do I have a database of potential market?

The Internet in itself is the primary source of this. But maximizing it is another question. Of course, you can always refer to having someone else's address book, as a source of your database, but you can never have the address book of other potentially opened-up for you. Also, not discounting the fact that with this method, the probability of getting undeliverable or mailer-daemon message return is at a high percentage.

If you want to maximize your capacity, you can indulge into purchasing some programs from the net where it can give you the number of databases that you want -- even more, you can have millions of address lists in just a snap. With millions of address lists, are you not ensured of an income even when just a portion of this returns back to your advertisement?

Article Source:Raymond Nesa Read More......

A brief about Daemon.exe

The daemon.exe process is used to enable the use of the trackpoint pointing device (touchpoint mouse) built into the keyboard of IBM laptops. If you stop this process the trackpoint pointing device will no longer function.

daemon.exe is flagged as a system process and does not appear to be a security risk. However, removing Trackpoint Server may adversly impact your system.

The Process Server database currently registers daemon.exe to IBM.

This is part of IBM laptop drivers.daemon.exe is related to ibmpmsvc.exe, tp4ex.exe, tp4mon.exe, tp4serv.exe, tphkmgr.exe, tponscr.exe.Whenever you have a concern about a file like daemon.exe, feel free to visit our Anonymous Surfing section to help verify your file you are not giving away too much personal information.

The Process Server database is updated often, but inaccuracies may still exist, often caused by viruses named after valid files such as Trackpoint Server. Always verify your results just to play it safe.

very attempt has been made to provide you with the correct information for daemon.exe or TRACKPOINT SERVER. Many spyware / malware programs use filenames of usual, non-malware programs. If we have included information about daemon.exe that is inaccurate, we would greatly appreciate your help by updating the Process Information database and we will do our best to correct it.

You should verify the accuracy of information we provided about daemon.exe. Trackpoint Server may have had a status change since this page was published. Read More......

The Importance Of Virus Protection And Its Impact On Your Computer

Meaning of computer virus

Computer viruses are special programs which are written or created for the purpose of upsetting or destroying the performance of the computer systems. Hence, every computer needs anti virus software capable of detecting these viruses and eliminating them from the computer systems. Computer viruses are spread through internet downloads as well as through opening of email or by downloading an attachment.

What is anti virus software?

Anti virus software is a written program designed specifically to detect the viruses and prevent them from damaging the computer systems.

The reasons for computer anti virus program

Anti Virus program is necessary to keep the computer systems and the network running effectively. A virus can cause great havoc on your computer, if, it is not detected. Anti virus program installed on your computer will keep it safe against viruses.

Computer viruses affect the speed and efficiency of your system thereby causing you longer time to complete a task. Some of these viruses are so destructive that the whole system can crash and stop working resulting in lost of data. If you need your computer to work efficiently and effectively for you, you should installed computer anti virus software. Having a good anti virus program is not just enough, and to ensure that our computer is always safe, one needs to update regularly the virus protection software.

Computer viruses come in different forms. This make it difficult to find out which virus is causing problem to our system. However, if a good anti virus software is installed you will be informed when a computer virus attacked your system. You should always scan your computer system with the scanning tools that comes with the software in order to clean and eliminate the virus before it causes any major problem.

Having installed anti virus software, you need to turn on the program to enable it detect any virus trying to enter through emails or when downloading files. Once, you have been notified of a virus, your anti virus software should guide you step by step towards removing the virus. It is also important that you must remove the virus completely before using the computer; otherwise, the virus may spread through emails sent to friends.

Finally, everyone who uses the computer must protect it against virus attack. If virus enters your computer system, all your personal data as well as business data would be lost. Also, you would have to invest thousands of dollars to repair the computer system to work efficiently as before the virus attack. Read More......

What You Don't Know About Virus Removal

It is a fact of life that everyone gets a virus now and then. It is also a fact of life that nobody wants them. This means you are going to need some kind of virus removal if you own a computer otherwise your going to have a hard time on your hands.

Not only are viruses a nuisance to you and your computer, but they threaten to be quite harmful to the both of you. A virus could potentially delete all of the data of your hard drive or even worse they could steal the data which may just be your personal and confidential information such as your social security number, credit card number, or your bank account. This means with a virus on your computer you stand to lose a whole lot more than performance, you risk identity theft and loss of large amounts of monetary funds.

If you feel that you have a virus, virus removal will be the perfect solution for you. Some fairly obvious ways to tell if you have a virus include your computer slowing much slower than it would usually. Another sign is if you have constant pop ups whenever you are at a site that would normally not give you pop ups such as Google. There are many ways to identify having a virus, although the best way is to run a virus scan, and then taking action with a virus removal.

Virus removal is going to be essential to you and your computer. It has the potential to not only stop your problem that you have now but any future problems that might have come from a virus like a Trojan. It seeks out the problem in your computer and looks to completely destroy it as well as potentially fixing the problem in other ways. It is a key tool in your arsenal on the war of not only computer performance but computer protection as well.

If you want to find somewhere that offers virus removal just check out some anti-virus software or some websites even offer free virus removal. It is not a hard thing to come about do not forget that you can find it through online web services or programs you can download. This way you get a choice in what you install on your computer or not, also be sure to pick a virus removal program that is reliable and has some decent feedback as some do put out programs that may be viruses themselves.

So if you think you might have a virus on your home computer or laptop find a program or website that will provide you with virus removal. In doing so, you get that annoying virus off of your computer and you can feel safe again. Read More......

How to Clean a Trojan Virus & Make Your Computer Secure

What should you do to clean a trojan virus? In this article, we will discuss what a trojan virus is, and how to get rid of it safely.

A trojan virus is a small program that hides on a computer that is infected. The trojan allows hackers to have access to your stored passwords on your computer. Hackers can also read any personal documents stored on your hard drive. In addition, by using a trojan virus, they can delete files on your system, and display strange pictures or show messages on your computer screen. A trojan virus gets on your computer when you run an executable (.exe) file on your computer that is infected. Trojan viruses can also be hidden inside other programs, so your computer might have been infected if you downloaded some funny type of email that you received.

In order to clean a trojan virus, you need to get a spyware cleaner (trojan horses fall under the classification of spyware). An effective spyware removal program has a user interface that is easy to operate, and will scan your system for any trojan horses and other types of harmful intruders that may be lurking underneath the surface. You will then be shown the results, giving you the option of deleting them. A good spyware remover also acts as an anti spyware program, which will work to defend your computer against future attacks. You can also set the spyware removal program to perform future scans for new trojan and spyware/malware threats.


Article by Amtikl Read More......

How To Get Rid Of Computer Viruses

When is comes to learning how to get rid of computer viruses there really is only one solution and that is by using a virus removal tool. Virus infections are designed to spread from computer to computer and destroy as many files and folders as they possibly can and that's why you will have little luck in removing it if you decide to do it manually. With the internet growing each day the number of infections has dramatically increased and this is why the importance of performing regular scans can never be stressed enough.

Computer viruses differ from other infections like spyware and adware in that their main objective is to spread and cause instant damage to your operating system. On the other hand infections like spyware and adware are mostly advertisement related and have the objective of stealing information from your pc while monitoring your web surfing activities. All three of these infection types usually infect your pc via the same methods which include p2p network downloads, freeware applications, email attachments and from clicking on unknown pop ups or boxes which trigger malicious backdoor installations.

You will know if your pc is infected with a virus as it will suffer from poor system speed, pop ups, less functionality and the possible formation of unknown desktop shortcuts and toolbars. Virus removal tools are designed to detect signatures within files on your system and will remove or quarantine them according to their risk levels and this is why you should ensure that you scan your system regularly to prevent future problems.

Article Source:Markus_Sampson Read More......

Finding The Best Virus Removal Tool - 5 Tips That Can Help You

Choosing the best virus removal tool can be confusing for many people. There are so many different virus removal tools out on the Internet today. It is hard to know which ones are the best to remove the many viruses that are out there. Here are some tips on finding the right one.

Make sure you read the different product reviews and ratings on the Internet and in magazines on the anti-virus tool that you are interested in. This will give you more information on the product, then you can decide whether or not you want to try out the program.

Choose a program that is free to try, and if you like it, you can get the full version. Many programs have a trial period of about 30 days so it will give you enough time to decide if you want to buy.

If you do decide to buy a virus removal program make sure you do not spend over $50. There plenty of high quality programs out there that are well under $50 dollars and some are even free.

When looking at anti-virus programs make sure that the program has free updates so your computer will be protected from newly created viruses.

Many programs come bundled with other applications such as an anti-spy ware removal tool and registry cleaner. If you choose to get one of these programs it will save you money in the long run so you do not have to buy the other programs separately.

Whatever virus removal tool you may choose, make sure that you run routine scans and update the program often so your computer will be protected from new viruses that are going around today.

Article Source: Michelle_A_Smith Read More......

How To Check If Your Ipod Has A Virus

After September 2006 a number of apple iPods had been shipped with a windows virus. Luckily for most mp3 and iPod users only a very small number are actually infected and this virus which only affects windows computers is called the RavMonE.exe virus. So, how do you check or remove this iPod virus?

Firstly if you have your ipod attached to your PC and have the latest anti virus software installed this should automatically detect and clean your pc/iPod of any virus present including the ravmone.exe virus. The iPod nano, shuffle and mac OS are not affected and the latest iPod video are also guaranteed to be virus free.

First steps to check if your pc or ipod is infected is to download a virus scanner (if you do not have one already installed), there are many free virus scanners available and most new PCs already have these automatically installed. In 99% of cases your iPod will be virus free but it is still best to check. Simply attach your ipod to your PC and run the virus scan.

Your anti virus software will then perform the checks and inform you of any viruses that are resident on your pc/iPod. After the removal of any viruses you should use the very latest version of i-tunes to reinstall the software on your iPod. The ravmone.exe virus is attracted to storage devices and you should also scan all storage devices on your PC just to be sure.

article by debra on ezine article Read More......