F Best free antivirus software and antivirus software reviews

Best free antivirus software and antivirus software reviews

Best free antivirus software - what's it, where to find it and how to download or buy it. I'll try to find for you a lot of different antispyware and antivirus software products


Open VPN

Thursday, November 30, 2006

Dump your brain with the Best Marketing Tactics.

Ever wonder why some marketing tactics work for some businesses but not others? Maybe you heard about a business that paints their company website's URL on the top of their delivery trucks and increased online sales by 25% in a single quarter. However, when you try the same tactic, your sales remain flat.

The reason most marketing tactics fail is that they are not part of a comprehensive marketing strategy. A comprehensive marketing strategy helps you to choose which tactics will work for your business and keep the sales coming in like clockwork no matter what the economy.

Defining Marketing Strategy

Imagine you are on a hunting trip. You find yourself standing in the middle of a field with your rifle in your hand. Without a marketing strategy, you'll be shooting at every leaf that the wind picks up.

Your marketing strategy will help you to decide whether you should be shooting at rabbits or elephants. Not only will your marketing strategy help you to define your target, it will help you hit that target when you raise your rifle to your shoulder and take aim.

This analogy is rich with meaning. If you're hunting Polar Bears, then Times Square in New York City is not going to provide a lot of opportunity for you to bag your desired trophy.

In addition to picking the right spot to hunt, you need to pick your weapon based upon the animal you're hunting. The same ammunition that effectively kills a rabbit or squirrel is just going to annoy a rhinoceros. Conversely, the ammunition that drops a rhino is going to obliterate smaller game.

If you have never shot a rifle before, the you should know that the sight on a rifle will determine whether you hit your target. If the sight is out of alignment, even though you have the target lined up with your sight, you will not hit the target. You will, instead, end up shooting above, below or to either the left or right of your target. Even if your shooting mechanics are flawless, a rifle with a sight that is out of alignment will prevent you from hitting your target.

When your marketing strategy combines the rifle with the properly aligned sight, you will find your shooting accuracy will improve dramatically.

Four Steps of Creating Powerful Marketing Strategies

STEP ONE - Research, research research

This is where you find out what you do not know. The more you know, the better your marketing strategy will be.

Leave no stone unturned as you define:

* Your customers
Age, income, education, marital statues, religious preferences, comfort level with technology, where they live, where they work, what they drive.

You just cannot know enough about your customers.

* Your competitors
Who are they? Are they only in your industry? What is their USP (Unique Selling Proposition)? Why do their customers choose them?

You may be surprised to discover your competition is not another business after all. Consider the car wash chain that discovered their biggest competitor was their own customer! Instead of looking to annihilate the other car wash facilities, this chain began focusing their marketing efforts on educating their customers on the benefits to bringing their car to them instead of washing their cars at home. Sales increased significantly once this chain realized where to point their marketing strategy. Another often overlooked "competitor" is the ever present "Do nothing". Doing nothing is always an option. Frequently, it's the service professional's strongest competitor. Never underestimate the power of doing nothing.

STEP TWO - Determine the problems your customer has and the solutions you offer.

Everyone has problems. Marketing is merely the act of bringing your solutions before the people who need it most and are ready, willing and able to pay for it.

Once you know everything about your customer, you already know the solutions he or she is seeking.

STEP THREE - Determine the emotional triggers that will ignite your sales.

The act of buying is a complex and emotional decision. The reason your customer is making a purchase is not always readily apparent. While you may be selling candles, your customers may be buying:

Emergency lighting
Aroma therapy

Find out why your customers are buying and you will be on your way to marketing success.

STEP FOUR - Creating a strategy that results in breakthrough performance for your marketing efforts

Now it is time to take the information gathered in the first three steps to create a precise marketing strategy for your business or product.

Following these four steps is the foundation for creating a precise marketing strategy that will break through to your best clients and customers.

Amazing photos/pics of Windows Vista users

Wednesday, November 29, 2006

Without words....

Ok, just some comments - this is more danger then viruses, but I like her.

Widows Vista troubles - 65 More Windows Vista Mistakes

I just couldn’t leave well enough alone. Even after my problems with Outlook 2007, and my original feedback on Windows Vista, I went deeper into Windows Vista’s second beta. This time, I didn’t concentrate so much on the font issues (so that I couldn’t be accused of being such a nitpicker). Don’t get me wrong; there are still thousands of UI oversights still sitting within Windows. I intend to prove that beyond a shadow of a doubt. I don’t just want to hear about how some of my problems were addressed - I won’t rest until all of them are. I keep being told that a lot of it will be happening soon, but… I’ll believe it when I see it. This isn’t just about fonts and icons, my friends - it’s about something I intend on using as my primary operating system for the next… seven (?) years.

1. Why can’t it detect when I have a .com on the end of a domain in the “Start Search” field - working much like CTRL+Enter does in IE or Firefox?
2. If Windows is moving slowly, I can see the stop/refresh button in the Windows Explorer jump. At least, the graphic inside the button starts lower than normal - then jumps up to the proper (aligned, centered) position.
3. Dragging object icons - strange transparency issue still exists. Looks like hell.
4. For some reason, many dialogs/windows have a black line between the glass and the top of the inner-portion of the window. If this is due to me changing the size of my title bar - you’ve got a serious bug to fix.
5. Why, if I change my Shell Dlg font in XP to Segoe UI, the default size is 8pt - in Vista, it’s 9pt - and that REALLY screws things up. Is there no way to set it to 8pt anywhere? Please make the hook?
6. Would somebody please smack the person who thought that white Battery/Power and Volume icons were en vogue?
7. Why won’t you let me exit out of the location settings dialog if I don’t want to enter an area code first? Even by confirming that I don’t want to do it yet, you keep the window open. This might be tied into how I found out - by trying to get a Business number within Outlook. This may very well be Outlook’s fault, not your own (in which case, that’s another red checkmark in the Outlook 2007 column).
8. I was able to get ReadyBoost working, I think. If there’s an easy way to watch benchmarks, I’m not finding it. Tried looking for a “Benchmarks” option in the Start Menu, but it’s just not obvious to me. I found it once, but I’ll be damned if I can find it again. Tried looking in the most logical places, too - including within the Task Manager.
9. The ReadyBoost tab should display information like “You’ve sped up your system by 10% by using ReadyBoost today.” Wouldn’t that be nice to know? It’d also be nice if you could tell me the relative speed of my current USB memory stick - so that I could find out if there were faster ones available.
10. Why doesn’t ReadyBoost information show up in the System Properties? Ya know, Control Panel | System? There, it still shows me running “1.0 GB of RAM” - but it’s not accounting for the flash RAM I’ve just inserted.
11. System Information (if that’s Vista’s) is calling on a different point size of a font. I believe it’s Segoe UI, but it’s awfully 9pt Tahoma’ish to me.
12. The Event Viewer has tons of useful information. If only you’d stop calling on Microsoft Sans Serif throughout, and remember the damn window size every time I open/close the app. Tried looking for the benchmarks / system resource view here, too - still can’t find it.
13. Sometimes when I’m fiddling with the Visual Appearance, I lose the ability to turn on transparency. I have to reboot the system before that feature works again (even so, I have to go in and re-toggle it a few times to get it to work).
14. Why aren’t you doing this?
15. Thank you for pseudo-updating the default selection of backgrounds / wallpapers. However, where’s the dual monitor support? Seriously, you have nothing in here for dual monitors. What if I want one wallpaper to be X and the other wallpaper to be Y? What if I want to stretch wallpapers on both screens to each independent resolution? I have 1600×1200 on one monitor right now, 1680×1050 on another. Non-tiled dual monitor wallpapers look like hell in this scenario. Fix it.
16. I love the “img15.jpg placeholder” wallpaper. I say it’s a keeper, even if you make it hidden somewhere in the system where only the geekiest geeks could find it. Sad thing is, the “img15.jpg placeholder” was designed better than just about any other graphical system element I’ve run across.
17. The Personalization dialog’s top nav section seems to have a background color applied to it (that’s not matching the background image). Same holds true for the System dialog (each found as a subsection of ‘Control Panel’). Oh, and Power Options, apparently. Why in some and not in others. At least if you’re gong to screw something up, screw it up all over the place please?
18. Mobility Center is not customizable. Why can’t I save settings to different profiles? Wouldn’t that make sense? Jeez, even my cell phone has profiles contingent on setting.
19. You only have seven settings in the Windows Mobility Center - can’t you just make up an 8th one, or are we really going to have to stare at this glaring empty space in the lower right-hand corner? My suggestion: do away with the separation lines altogether, flood the entire area with white space, and for PETE’S SAKE round the corners like you have the outside of the window!!!
20. What’s starting to drive me nuts is your inconsistent application of internal window margins. For example, the distance between the top border of an Explorer window and the first window element (the search bar) is different than the distance between the top border of the Windows Mobility Center and the first window element (in this case, the panels). Open Notepad, and you’ll notice another distance altogether. Who’s in charge of looking at this stuff!? You really expect someone to fork over $100+ for this?
21. I don’t mind seeing the circled question mark icon in a window. However, I DO mind that you keep putting it in different places. Again, let’s compare and contrast the Windows Explorer window and a Windows Mobility Center window.
22. Why can’t I easily switch to the Recording options in the new Volume dialog? Seriously, why?
23. Why do the Volume dialog’s sliders have a boxy shadow behind them? Looks horrible.
24. I made this point a couple of bugs ago, but it really deserves to be called out here. Are things going to be curved or not? If you are going to curve the edge of Windows elements, then curve all of them. Not some of them - all of them. This would include every single possible edge you find in the OS. Buttons, borders, backgrounds, etc.
25. In the new (file) Open dialog, why does the “File name” field sport a different height than the “File type” field? Then, why are both of them sporting different heights than the breadcrumb and search bars at the top of the dialog. Gah!!! Do I need to buy someone a ruler… and slap them on the wrist with it a few times?
26. Again, in this Frankenstein of a file Open dialog, I have one several opportunities to press an upward/downward arrow. I press the one in the Search box (it’s one width, producing a menu typical of what I find throughout other programs). I press the one in the object area (seeing the width of the arrow button is fatter, producing another style of drop-down for object sorting and filtering). I press the one for the Folders view (seeing that it’s now a circle button, and that produces inconsistent padding both above and below it). I think you just made Baby Jesus cry.
27. In the open dialog’s breadcrumb bar, sometimes the file name (or path) gets cut off. No way of seeing what’s past a certain point. I don’t see a handlebar to make that area wider, but it should either stretch to a better length on its own or provide some kind of tooltip to show me the truncated information.
28. Hey, would someone please fix the fact that the Task Manager’s Applications Pane has a horizontal scroll bar that never goes away - no matter what you do? It serves no purpose and has been annoying the hell out of me since Windows 2000. WHY IS IT THERE?!
29. In the Task Manager, why can’t I right-click a column heading to add other columns - I can do that in an Explorer window - why not here as well? Did the Task Manager programmer not pay his Tribute to the king?
30. Why, in the Task Manager, when I hover over a truncated title, do I not see a tooltip with the hidden information?
31. Who’s duck do I have to sick to make this easier to do?
32. I turned off the Security Center. Why is it still showing up in my system tray?
33. Clicking the “Adjust indexing options” in the Performance Rating and Tools dialog (subsection of ‘Control Panel’) does nothing.
34. On my laptop, the Power Options should automatically go into Power Saver mode when I’m not plugged into AC power. Right now, I have to toggle everything manually. Likewise, it should go High Performance when I’m plugged into an external power source.
35. You have to figure out what else to do when it comes to needing more information in a Control Panel option. For the first hour or so, I didn’t even see the scroll bar in many panels. For example, Control Panel | Power Options | System Settings is just tall enough to warrant a vertical scrollbar. However, it’s pointless - there’s nothing else to show down there but (admittedly properly measured) white space.
36. Why am I still seeing old Windows dialogs? Like, for the Screen Saver option in the Control Panel. Shouldn’t that be a subsection of the Personalization applet?
37. There we go! I found the “Performance Diagnostic Console” finally. This is nice, but you wanna talk about scrollbar overkill? I’ve got more scrollbars in this single window than I think actually exist. Thus, creating what I like to call a “paradox.”
38. Reliability Monitor in the Performance Diagnostic Console is pretty nice. A few controls and images are awfully old, but the tool itself might prove useful in troubleshooting scenarios.
39. OMG. The Performance Monitor section of the Performance Diagnostic Console is calling on the System (or Terminal) font?!
40. Why can’t I drag & drop the Resource Overview (in the Performance Diagnostics section of the Performance Diagnostic Console) into the Sidebar? Either all four, or each one individually?
41. This is weird. I’m looking at the Personalization dialog here. The status bar is turned on, claiming… “2 items.” Really? I see more than two items here, so what “2 items” is it referring to? Conversely, the status bar claims to be seeing “0 items” in the System dialog of the Control Panel. Who’s seeing what?
42. I know you said it wasn’t going to make it, but can someone please tell me why I don’t have a slider control or pause button in the Windows Explorer copy function?
43. Why, when resizing a dialog like “Problem Reports and Solutions,” do I see white space appear in the window title area - specifically, on the side that I’m moving back and forth? Other areas of the window are being painted irregularly, too. Looks fine when I stop movement, but the actual movement is jarring to the window elements (apparently). Do you not expect anybody to resize - or do you expect them to excuse this kind of UI quirk?
44. In the Start Menu, why does an empty folder cascade out to “(empty)”? If you’re going to do that, at least shade “(empty)” a light gray instead of black.
45. Can you please require people to reference the same 16×16 help icon that I keep seeing everywhere? I’ve seen about three different versions of it - one polished, one plain, another completely different than these other two. Sounds like all of you need help with it.
46. The SendTo context menu seems to be calling on another kind of layout (compressed, compared to the overly-spacious Windows default). So, too, are the submenus of the Start Menu rightmost pane (Games, Favorites, Computer, etc.). AGAIN, a completely different style is being applied to the New context menu (Folder, Shortcut, etc.). Yet another style is being applied to the Organize menu in the Windows Explorer! IMHO, all menus should look and feel the same throughout the entire OS. If you want a baseline, look no further than the submenus of the Start Menu.
47. Why don’t I get a larger thumbnail preview of a document or image that I have on my desktop? Seriously, why? Is 128 MB of video RAM not enough?
48. Okay, now THIS is just funny (and sad at the same time). The Start Menu: nice default view, the margins between each recently-opened program shortcut seem fine - until you toggle the “All Programs” feature. Now, the margins between each of the Start Menu items is smaller. It’s noticeable. Small difference, but still quite noticeable. Egad, if you can’t even get it right in the same area - what hope does the rest of Windows have?
49. The separator bar between “All Programs” / “Back” changes widths by a few pixels on each end when you toggle the view. Again, I don’t know whether to laugh or to cry. I’ve been waiting seven years for THIS?!
50. Just read a post on Channel 9 referencing my original list of Vista problems… “Wow, that’s the most annually retentive post I’ve ever read… Can you imagine what this person does when they actually find a problem as opposed to “OMFG BATMAN THAT BUTTON IS NOT PIXEL ALIGNED!!!1!!” I responded: “Yeah, and it’s attitudes like this which cause potentially ‘great’ products to come across as ‘okay.’ If that kind of sloppiness is happening on the surface, I cringe when I think about what’s going on underneath.”
51. The separator bar between the Start Menu Pin section and the list of recently-opened programs has a different “vspace” than the separator bar at the bottom of the Start Menu separating the “All Programs” toggle with the list of recently-opened programs.
52. Why does the system tray battery icon have an abnormal left margin to it? Breaks the flow here.
53. How come Firefox runs faster and better on Vista than IE7 does?
54. “Search the Index” option in the Start Menu’s “Start Search” field - what Index? Who’s Index? What’s an Index?
55. To piggyback the prior issue, “Search the Internet” - is that Live’s version of the Internet or Google’s? Can this be toggled to Google easily? If so, where? If not, why not?
56. I hit it on my first list, but the Windows Calendar UI is amazingly pathetic and inconsistent. First, why is the Search field formatted differently than it is in the Windows Explorer? Second, why is the Search field slapped up against the right border of the window!? Third, why is the view button not working like the View button in the Windows Explorer? Fourth, Why is the calendar formatted differently than it is in the Windows Date & Settings applet? Fifth, why is the “traditional” menu turned on in this program by default? Sixth, why is there virtually no top margin to the area within the Calendars section of the Navigation pane? Sixth, is there going to be a plan to better integrate this within Outlook - so that the two could work seamlessly between each other so that I don’t have to get an Exchance server just to share information between myself and others - and so that I don’t have to update two sets of Tasks and Appointments!? *sigh*
57. Why, and pardon me if this is wrong of me to ask, can’t I manage all my Windows Live accounts from a Control Panel applet?
58. Man, there’s so much going on inside the Search Index window - it’s like I’ve died and gone to short-attention span heaven. The only thing that’s missing is (seriously) the kitchen sink.
59. The Search Index window’s “Add a title” field text seems to be improperly aligned - as does its little magnifying glass graphic.
60. Why can’t I turn off the text and/or icons in the new Windows toolbar? I hate seeing the double-arrows when there are more options. I can make it with the icons, thank you very much.
61. The “in” field seems to be a different height than the “Add a title” field (and I’m still not sure what “Add a title” even means).
62. Why can’t I choose what meta information displays in the Windows Vista Preview Pane?
63. In Windows Explorer Views, I should never see a horizontal scrollbar. Instead, you should follow Outlook’s lead (!) and automatically push the information together into a single chunk rather than force me to look to the right or left to get to the information I’ve asked to see. And don’t tell me to maximize the window - that’s a cop out, and you know it.
64. Who decided that the progress bar would be green? Why isn’t that themable? I’d assume it’s a graphic - and if not, then why can’t I make it some other color?
65. Whoa. The Windows Easy Transfer dialog to warn you that the firewall is blocking the program from running appears to have fallen out of the ugly tree and hit every branch on its way down. You look at it and tell me why I’d even say such a thing. Seems that other Yes/No dialogs have fallen out of the same tree in this tool as well.
66. Why is the Favorites folder icon the only folder icon that doesn’t have a folder icon in it? It’s just this gigantic star. I think it’s fine that way, but if you’re not going to have a folder image in the Favorites folder icon, then get rid of the other special folders’ folder icons.
67. Where’s the “Export all possible Windows settings” feature? I think it’s supposed to be there for documents, emails, photos, etc. - but what about my generic windows settings?

Okay, I lied. 67 instead of 65. That’s enough feedback for Vista in one afternoon. I’m going back to picking apart Outlook 2007 now, and will push you back to my first Vista list if this wasn’t enough.
READ AND COPY FROM65 More Windows Vista Mistakes

I recommend. Updated Chronological Virus List .

The Chronological Virus List contains all data collected from 7 different anti-virus vendors. The number enclosed by [] indicates if the virus is grouped with virus descriptions and how many.

Please note timestamps are in GMT+1. Also, note that most older viruses do not include timestamps.
It's from - http://secunia.com/chronological_virus_list

Tuesday, November 28, 2006

Viruses from MP3

If you download an .mp3 file, and it has a VBscript icon, DO NOT CLICK on it!!! Right click on it, and open it in notepad, to see that it is a virus called the plan colombia virus. Delete this file. If you have clicked on it, you must remove linux.vbs and reload.vbs files from your machine, or the virus will reload every time you restart your computer. Also, every .vbs file on your computer contains a copy of the virus, delete them all. It makes copies of all .jpg files with .vbs extensions, and places copies of the virus in them. It is essentially the same as the loveletter virus. I think some record company may have planted this virus to cause problems with file sharing. Beware!!

Monday, November 27, 2006

Make Money With Google AdSense

After studying this article I have lead a number of experiments during a week. Results I shall publish soon.
"Anyone who owns or is thinking about creating a website would be crazy to ignore this.

I am happy to say that earning money with your site, no matter the topic, has become easier than it's ever been before - and it's 100% legitimate.

If this program had been available in 2000, I would have NEVER shut down my soap opera fan site that received 200 hits per day. I would have been able to earn money from that traffic and probably turned a small profit.
From Adwords to AdSense

Google.com earns most of its revenue by allowing other website owners to advertise on their search result pages. All this is managed through a program they call Adwords.

Now you can earn a share of the revenue that Google earns from Adwords by placing these same text ads on your site. In other words, you're helping Google advertise and they pay you a percentage of what they earn.

This program is called AdSense.

Every website owner should be involved in this. It's just too good of an opportunity to pass up. Even if your site is just for information purposes, you can still participate and make decent money with AdSense -- or at least enough to fund your website.

So if you are one of those people that don't like the idea of paying for a site, this is an excellent way to earn your money back and then some.

Even if you earned as little as $10 in a month, it would more than likely cover some or all of the costs for your web site. Perhaps you are simply looking for ways to add additional revenue to your website, then it's perfect for that situation too.

This program is getting so popular, people are creating websites just to display the ads and profit from Google's AdSense alone.

I don't usually like to use the term "easy money" because there really is no such thing. You still have to create your own website and learn how to bring in traffic in order to make good money with this program.

I certainly don't want to make it sound like you get something for doing absolutely nothing. There's no such thing.

However, I've got to say that AdSense is probably the closest you'll ever come to fast money on the Internet -- especially if you already have a website that gets a good amount of traffic.

What's even better...the program is completely free. You can also use it on multiple websites and there is no limit to the amount you can earn.

How AdSense Works
If you go to Google.com and do a search for almost any keyword phrase, you'll notice some "Sponsored Links" that appear on the right side of the screen that are relevant to the keywords you just searched for.

Website owners pay Google to display these ads and are charged a predetermined amount every time their ad gets clicked by a web surfer. With the AdSense program, you will display these same text ads on your site just like Google and get paid for it as well.

All you do is copy and paste some provided HTML code into your pages and Voila! the ads will show up. Every time an ad is clicked on your site, you will receive a certain percentage of what Google receives from the advertiser.

Once your account reaches $100, you'll receive a check in the mail.

"Is Google Crazy?"
I know what you're probably thinking...

"What's the catch here? Why would Google just give away money advertisers are paying them?"

The answer...

Because Google is very smart.

Now that I understand how AdSense works, I can see that it's a win-win situation for everyone involved, and the bottom line benefits Google. Let me explain...

Since the advertiser's ads are now being displayed on more web sites all over the internet (instead of just Google's site), they are getting much more exposure. More exposure means more clicks and even more traffic for their site over a shorter period of time.

This is good news for Google because the more traffic the advertisers receive, the faster their advertising funds are used up.

Remember, they get charged every time their site gets a visit; and of course, it is Google's hope that they'll continue to keep funneling more money into their account for more ad exposure.

What an ingenious way for Google to increase the amount of money they earn from advertisers while building loyalty with website owners (like us) who are now getting paid to help them advertise.

Of course, I'd expect nothing less from the most popular search engine on the web. :)
My Personal AdSense Story

I have been receiving monthly checks from Google since 2003, and I've read numerous success stories of websites earning 5 digit incomes per month with AdSense.

Now, I will admit, a 5-digit commission in a single month is probably not the norm for most participants. I promote AdSense on three of my websites and my checks have been as high as $1900.

I would estimate that my earnings are above average and that is mainly because I keep adding more content to my sites on an ongoing basis.

The more information you have, the greater chance you have of attracting free search engine traffic. That's why it's so very important you choose a topic you have an interest in so you can keep building and building.

My checks weren't always that large. I think my first month's earnings in 2003 totaled less than $20. However, I kept getting more and more search engine traffic by adding more content and the checks slowly began to increase. I had no idea it would grow to anything like this.


I read an article about a lazy person that copied someone else's content word for word and pasted on their own site. They tried to join AdSense and they were rejected for unauthentic content. I don't know how Google found out their site was a duplicate of someone else's but they did.

Not to mention, the search engines are now ignoring pages with duplicate content. So all the thieves out there that are too lazy to come up with their own content are now finding that they cannot get their site ranked in Google, Yahoo and MSN simply because they've copied someone else's work.

It's not worth the risk. Not to mention, it's illegal to republish someone else's work without permission. That's why you should choose a topic you know a lot about or at least have a great interest in. There's no reason to copy off someone else's site. Be original. Laziness always comes to bite you in the long-run.

"How Much Can I Earn With AdSense?"
Google does not disclose exactly how much you'll earn per ad that is clicked.

The commission you receive per click depends on how much advertisers are paying Google for the particular ad. You will earn a share of that amount. I've heard of earnings anywhere from 2 cents to $15 per click.

So it is logical to believe that keyword phrases like debt free, employment, make money, mp3, sex, etc. will earn you more per click since these are highly competitive keywords that are searched for quite a bit on the web.

Advertisers generally pay more for popular terms because they are searched for more.

Even though Google will not reveal how much you are earning for each ad that is clicked from your site, you can still login to your account at any time and see the total amount of revenue you've generated that day, week, month, year, etc.

For example, if you see that you've made $12.60 today from 9 clicks then you can calculate that your average click-thru commission was $1.40 per click. That's as detailed as their stats will get. Also remember, that's only an average. You won't know how much each specific ad brought in.

The amount you'll earn also depends largely on the amount of targeted traffic you receive to your own site, how well the ads match your audience's interests, the placement of the ads on your pages, and of course the amount you receive per click.

Ideally, you should create a site on a topic you know a lot about. That way you'll have a much easier time creating a generous amount of content on that subject.

How Google Matches the Ads to Your Site's Content
One of the main reasons this program is so successful is because the ads that are displayed closely match the content of your website. This increases the chances that someone will click on the ads.

Here's how Google accomplishes the content match...

"...We go beyond simple keyword matching to understand the context and content of web pages. Based on an algorithm that includes such factors as keyword analysis, word frequency, font size, and the overall link structure of the web, we know what a page is about, and can precisely match Google ads to each page."

So let's say you have an information website about yoga. Once you join AdSense and paste their ad code into your site, Google's technology will determine the topic of the pages by scanning for keyword repeats, page title, etc.

If successful, you will see ads that relate to yoga displayed on your web pages. Of course, the more related the ads are to your site's content, the better the click-thru.

Keep in mind, the ads may not be an exact match because it depends on the ads inside Google's database. So instead of seeing yoga ads, you may see more generic ads like exercise, healthy eating, etc. This is not a bad thing because these are topics your visitors will likely be interested in as well.

Why I Believe AdSense Works So Well
For years, website owners have tried to make money from their sites by putting up banner ads in hopes of visitors clicking them. The problem with banner ads is that the Internet audience is so immune to them, people do not click on them anymore.

When's the last time you clicked a banner ad?


Second, in order for the web site owner to earn money from that banner ad, usually the web surfer that clicks has to purchase something. With AdSense, your visitors just have to click the ads. They don't have to purchase a single thing.

Third, most people that use banner ads do not do a good job of matching the ads to the website's content so the click thru percentages are dismal.

With Google's AdSense, not only are you displaying text ads, (which tend to receive a much higher click-thru rate than banner ads), but you are displaying contextual ads that match your website's content....thanks to Google's advanced technology.

Lots of times people think the ads are part of your site's content so they click because the information is relevant to your site. Whereas with banner ads, they often have little relevance and people tend to ignore them no matter how much they flash and fly across the page.

Creating Your Website for AdSense
Before you even begin your site, make sure you've come up with a topic that you feel you know plenty about. That way it will be easiest to write a lot of content.

The more content you have, the better chance you have getting accepted into the program. Also, the more content, the greater the earning potential. AdSense is nothing but a numbers game. If you want to make a lot of money, prepare to write a lot of content.

Now let's talk about building your website. There are two ways you can approach this:

1) Do it Yourself (DIY) from scratch

2) Use Site Build It! (SBI!)

The Do It Yourself Method

I've actually used both methods for building my site and there are advantages and disadvantages to both.

If you use the DIY method, you will have to go and register a domain name (yoursite.com) and then sign up for a web host and build your pages. You can either learn HTML or buy some kind of web editor like Microsoft FrontPage to build your pages. That's the method I used to build this site.

Averaging between $7 and $15 per month, the DIY method is usually the most cost friendly of the two but you are mostly on your own in terms of learning how to create your web pages and adding the AdSense code to your site.

Web hosts are generally there to house your site. They don't specialize in helping you market and optimize your site for the search engines to help you get traffic. So don't expect a lot from them in terms of helping you market your site.

This is not necessarily a bad thing. I had to learn how to build this site on my own and it wasn't very difficult.

I bought Microsoft FrontPage and in about a day or two my site was up and running. So if you don't mind learning, it's definitely doable. In fact, most people use the DIY method to build their websites. The 2nd method below is fairly new in comparison.

Site Build It! - A Web Host Made for AdSense

This is a revolutionary web host like no other. I use it for my site, www.flat-stomach-exercises.com, and after only 11 months the site was earning over $700 per month for AdSense alone.

It took me over 2 years to earn that kind of AdSense income with this site using the do-it-yourself method.

Today, the site continues to earn money from AdSense yet I have no products to sell. I'm simply offering information on a topic I know a lot about and SBI showed me how to rank high in the search engines for various keyword phrases. Over 90% of traffic comes from the free search engines.

The reason SBI is different from the other do-it-yourself hosts is that first it provides all the web page building and marketing help all in one place. Your domain registration, web hosting and marketing help come with the price of $299 per year ($25/month).

Super Easy Web Page Builder

Creating your pages is as simple as entering text into form fields and using the user-friendly editor to add text, create links, add pictures and more. No software is needed to install or download. You simply select a template you want to use and your site is built in seconds...literally.

I took a screenshot of the SBI! interface...
Free Guides

What's even better is that you will have access to tons of free guides that show you how to optimize your site for the popular search engines so you can get as much free traffic as possible.

Remember, without traffic, you won't make any money with AdSense. That's why having a host like SBI is so important. Keep in mind, a regular DIY host does NOT help you with search engine rankings and traffic.

Brainstorming Tool

Site Build It also comes with a powerful brainstorming tool. So for all of you sitting there wondering about a topic, this tool literally scours the net and helps you decide on the best topic by showing demand and supply (i.e. number of sites on X topic and roughly how feasible it will be to bring in traffic for that particular subject). It is amazing.

The creator of Site Build It even built a micro site that describes how to maximize your AdSense earnings. And since Site Build It's main goal is to show you how to build income through content...it's almost as if AdSense was designed specifically for a web host like SBI.

See the SiteSell AdSense site here.

I highly recommend using SBI -- especially if you plan on building a site specifically to earn money from AdSense. It is the kind of host that stands for everything AdSense is about -- rewarding website owners for building an abundance of useful content.

Even though the two companies are not related, it really is the perfect marriage between a great concept like AdSense and a web host that is dedicated to showing you how to make money by simply providing information.

Successful SBI Websites

Be sure to also take a peek at all the successful SBI websites created by mostly beginners who have never created a site before. Every site listed on this page is in the top 3% in terms of amount of traffic received on the web - thanks to the SBI search engine help.

How to Join AdSense

After you have created your website, click the button on the right to join. Most sites are either accepted or rejected within 24 to 48 hours, so you shouldn't have to wait too long to find out if your application has been approved.

Once you've been accepted, simply copy and paste the provided HTML code into any page that you'd like to show the ads. If you've done a good job of defining the content on your web pages, the ads that show should be relevant to the content of your page...increasing the chances of click-thrus by your visitors.

You can either display the ads vertically along side the page like Google does or in a banner-like formation horizontally across your pages. The placement is up to you. You can even customize the colors to match your site's theme.

If Your Site Is Rejected by Google...
If you receive that email from Google stating that your site has not been accepted, the first thing you should remember is that as an AdSense member, you become a partner and are representing Google, Inc.

They have to make sure the websites that display these ads are up to par or they could run the risk of losing advertisers. Imagine if you were paying Google to display your ad and you found it showing up on a poorly developed, junky website.

Of course, if your site is rejected, it doesn't mean it is poorly developed. There may be other reasons:

1) Is your site an "About Me" page?

Google does not usually accept these kinds of personal sites because most of them do not have a specific topic or theme. They are usually just random facts about the website owner or their hobbies, pictures, etc.

It would be difficult for Google's technology to display targeted ads on these kinds of pages because the topics vary from subject to subject.

They are looking for "themed" sites that contain a generous amount of information on a specific topic. It could be anything from sewing tips to sports. Just make sure there is an obvious theme with adequate information.

2) Is your site organized?

Be sure your site has a neat and clean navigation that's easy to follow. Also ensure all the links work and that there are no typos. Keep the colors to a minimum and make sure each page has a consistent layout.

3) How many pages are on your site?

Even though Google doesn't specify a page number requirement, many believe they are looking for web sites with a certain amount of content. Again, it's not likely a two-page site will get accepted. Try to strive for at least 15 pages.

4) Is your content solid?

Don't just submit a website with a bunch of links to other sites. Be sure you have a themed/niche site with enough original content of your own.

5) Is your site an exact carbon copy of someone else's?

Some believe Google can find out if your site is original or not. Don't risk it and steal from someone else. It will come back to haunt you.

If you're stuck, write a few articles of your own and then go to sites like www.articlecity.com and sprinkle a few of their articles around your site to beef it up.

6) Be sure to read their program policy and procedures carefully and make sure your site hasn't violated any of the terms.

Tips on Succeeding With AdSense
Here are some tips for achieving success with AdSense.

1. Create a website with your (YourSite.com). Don't try to use a free web host because your site will likely have banners and pop-ups and get rejected because it looks unprofessional. Not to mention, a free web host will give you a website address like this:

instead of...


See how much more clean, concise and professional that last link is?

If paying for a website causes you to frown, remember the money you earn from AdSense could more than pay for the web hosting fees you'll incur.

Look at it as an investment instead of a cost. I never dreamed I'd have this much success with this program. My AdSense earnings clearly outweigh the few dollars I pay every month to maintain my sites.

2. If you don't know web programming or have no desire to learn it, get a beginner's design editor like Microsoft FrontPage. Using this program is a lot like using Microsoft Word. You can also publish your content directly to the web.

Keep in mind you can't use FrontPage alone. You must have a web host that will allow you to publish your site to the Internet via FrontPage. (More on web hosting in a sec.)

3. If the main goal of your site is to make money with AdSense, be sure to choose a topic that you know a lot about so you can write lots and lots of content.

Don't like to write? No problem! There are sites like www.articlecity.com that provide free reprint rights. Just search their database and find articles that match the theme of your site.

Don't rely completely on sites like this, however. You'll definitely want to have some of your own unique content. A few articles from these sites is fine, but relying on them for 90% of your information is not going to help your site.

4. Get traffic. Once your site is up and running you'll need to learn how to get your site listed in the major search engines.

Getting into Google is completely free right now and can bring in hundreds or even thousands of visitors per day. All you have to do is submit your site to them and wait patiently while Google ads it to the index. It can take a few months. Patience is key with Google. Then do the same with Yahoo, MSN, etc.

5. Partner up with other related sites and participate in link swaps. This means that you place a link to another person's site on your own site and they do the same for you in return. This is a great way to get even more free traffic.

6. Get a copy of AdSense Gold. There are tons of books on how to maximize your earnings with Adsense, but this one is different because it's written by someone who earns 5-figure Adsense checks every month. He gives you some invaluable free tips on his site, but if you want the most profitable strategies, you have to buy the book."
Copy from http://www.2createawebsite.com/money/google-adsense.html

70 % of viruses – a handwork of manufacturers of antivirus products.

As there was a participation of hackers in total amount of viruses is practically insignificant – only 30 %.

It is conclusive, that this volume bears in itself weight of the harmful programs, able to put serious harm to your computer, but …

Who composes the others of 70 %. The answer is obvious – that to whom it favourably – manufacturers of anti-virus programs.

You ask where proofs – and they are obvious – profit of the companies, anti-virus packages engaged by development, here the engine of anti-virus activity, and viruses of confidential laboratories is a lever.

It personally my opinion though acknowledgement I found set in various publications.

Friday, November 24, 2006

Antivirus programs review.

By operation with a modern personal computer of the user (and especially starting) can trap set of troubles: loss of data, a system hang, failure of separate parts of a computer and others. One of the reasons of these problems alongside with errors in the software) and inept operations of computer operator can be rich in system computer viruses. These programs similarly to biological viruses are multiplied, writing in system areas of a disk or being assigned to files and make various undesirable operations which, frequently, have disastrous consequences. To come a victim of this misfortune, each user should know principles of protection against computer viruses well. For a long time it is known, that to any poison sooner or later it is possible to find antidote. Such antidote in the computer world of steel the programs named anti-virus. The given programs can be classed on five main groups: Filters, detectors, auditors, doctors and vaccines. Antiviruses-filters are resident programs which notify the user on all attempts of any program to write on a disk, and especially to format it, and also other suspicious operations (for example about attempts to change installations CMOS). Thus the inquiry about the permission or prohibition of the given operation is output. The principle of operation of these programs is grounded appropriate vectors of interruptions. On matching with programs-detectors it is possible to carry scalability to advantage of programs of this class under the ratio as to known, so to unknown viruses whereas detectors are written under concrete sorts known at present to the programmer. It is especially actual now when there was a set of the viruses-mutants, growing dumb a constant code. However, programs-filters cannot watch the viruses accessing directly to BIOS, and also the BOOT-viruses which are becoming more active still before start of an antivirus, in an initial stage of loading of DOS, also it is possible to carry frequent output of inquiries about realization of any operation To disadvantages: answers to questions take away a lot of time from the user and get on to it nerves. At installation of some antiviruses-filters there can be conflicts to other resident programs using the same interruptions which simply cease to work. The greatest distribution to our country was received with programs-detectors, and the programs uniting in the detector and the doctor are more true. The most known representatives of this class - Aidstest, Doctor Web, MicroSoft AntiVirus further will be considered more in detail. Antiviruses-detectors are calculated for concrete viruses and grounded on matching of sequence of codes containing in a body of a virus with codes of checked programs. Such programs need to be updated on a regular basis as they fast become outdated and cannot find out new sorts of viruses. Auditors - programs which parse a current state of files and system areas of a disk and compare it to the information saved earlier in one datafiles of the auditor. Thus the state of BOOT-sector, table FAT, and also length of files, their time of creation, attributes, the check total is checked. Parsing messages of the program-auditor, the user can solve, than changes are called: a virus or not. At output of such messages it is not necessary to be betraid to a panic as the reason of changes, for example, lengths of the program can be at all and not a virus. So there was a case when one starting user outright has got a fright when antivirus AVSP has produced to it the message on changes in file CONFIG.SYS. It has appeared, that before on a computer installation of memory manager QEMM which writes the driver in CONFIG.SYS has been carried out. The most ineffective antiviruses concern to the last group - vaccines. They write in вакцинируемую the program tags of a concrete virus so, that the virus considers its already infected.


In our country as already it has been told above, special popularity was gained with the anti-virus programs combining in of function of detectors and doctors. Most known of them is program AIDSTEST of D.N.Lozinsky. In Russia practically on each IBM-compatible personal computer there is one of versions of this program. One of the last version finds out more than 1100 viruses. Aidstest for the normal operation demands, that in memory there were no the resident antiviruses locking record in program files, therefore they should be unloaded, or having specified an option of outswapping to the resident program or to take advantage of the corresponding utility (for example in Wolves the Commander for these purposes there is a special item in the menu). At start Aidstest checks itself the RAM on presence of viruses known to it and neutralizes them. Thus the functions of a virus linked to reproduction will be paralysed only, and other by-effects can remain. Therefore the program after the termination of neutralization of a virus in memory asks about reboot. It is necessary to follow without fail to this advice if computer operator is not the system programmer, an engaged learning of properties of viruses. At what it is necessary to reboot button RESET as at « warm reboot » some viruses can be saved. In additives, it is better to start the computer and Aidstest with protected from record of a diskette as at start from the infected disk the virus can write in memory with the resident and interfere with treatment. Aidstest tests the body for presence of known viruses, and also on distortions in the code judges the infection with a unknown virus. At chances of a false alarm, for example at compression of an antivirus by a packager. The program has no graphic interface and modes of its operation are set by means of keys. Having specified path, it is possible to check up all disk, and separate subdirectory. As has shown an expert, the most optimal mode for daily operation is set by keys/g (check of all files, and not just with EXE extension, COM, SYS) and/s (slow check). Rich of time at such options practically not enough (completely "hammered" hard disk in capacity of 270 Megabytes on the computer with the processor 486DX2 is tested less minutes), but probability of detection on the order above. At usual testing it is not necessary to put a key/f (correction of the infected programs and erasing not a subject restoring), even with a key/q (to ask about file deletion), as any program, including anti-virus, not from errors. The key/f should be used when Aidstest, and also other antiviruses specify presence of a virus in any file. Thus it is necessary to restart a computer with protected from record of a diskette as the system can be infected by a resident virus and then treatment will be ineffective, and that simply dangerous. At detection of a virus in a valuable file it is necessary to copy it on a diskette, and it is even better - on electronic, a disk and there to try to cure by means of the instruction of Aidstest options/f. If attempt will not crown success it is necessary to delete all the infected copies of a file and to check up a disk again. If in a file the important information which to erase contains is a pity, it is possible to archive a file to wait for an output of new version Aidstest or other antivirus, capable to treat this type of a virus. For an expedition of process it is possible to route the infected file as sample Lozinsky. For creation in a log file of operation of program Aidstest the key/p is. The protocol happens is necessary, when, for example, the user has not time to view names of the infected files. For support anti-virus program - hardware Sheriff complex (further it will be considered more in detail), the key/z is.


Recently popularity of other anti-virus program - Doctor Web. Dr. Web also promptly grows, as well as Aidstest concerns to a class of detectors - doctors, but unlike last has so-called « the heuristic analyzer » - the algorithm, allowing to find out unknown viruses. « The medical web » as the program name is translated from English, became the answer of domestic programmers to invasion of self-updated viruses - mutants which at reproduction update the body so that does not remain any characteristic chain of byte which are present at the initial version of a virus. Dr. Web it is possible to name as an antivirus of a new generation on matching with Aidstest and its clones. In favour of this program speaks that fact, that the large license (2000 computers) the Central administrative board of informational resources at the President of the Russian Federation, and the second-largest buyer « has gained webs Handle of modes also as well as in Aidtest is carried out by means of keys. The user can specify to the program to test both all disk, and separate subdirectories or groups of files, or to refuse check of disks and to test only the RAM. In turn it is possible to test or only base memory, or, in addition, still and expanded (it is underlined by means of a key/H). As well as Aidstest Doctor Web can create the report on operation (a key/P), to load character generator Cyrillics (key/R), supports operation with hardware-software Sheriff complex (a key/Z). But , certainly, key feature of " the Medical web » is presence of the heuristic analyzer which is connected by a key/S. The balance between speed and quality can achieve, having specified to a key a level of the heuristic analysis: 0 - minimum, 1-optimal, 2 - maximum; thus, naturally, speed decreases proportionally to increase in quality. Besides Dr. Web allows to test files,CPAV, and also packed LZEXE, PKLITE, DIET. For this purpose it is necessary to specify a key/U (thus unpacking of files will be made on the current device) or/U a disk: (where a disk: - The device on which unpacking will be made) if a diskette from which it is started DoctorWeb it is protected from record. Many programs are packed in such a way though the user can and not suspect about it. If the key/U is not installed, Doctor Web can skip the virus which has got the packed program. The important function is the control of infection tested фай-лов a resident virus (a key/V). At scanning memory there is no absolute guarantee, that « the Medical web » will find out all the viruses which are being there. And so, at the job of function/V Dr. Web tries to prevent the remained resident viruses to infect tested files. Testing of hard disk Dr. Web borrows on much more time, than Aidstest, therefore not each user presumes to spend so much time for daily check of all hard disk. Such users can be advised more carefully (with an option/S2) to check the diskettes brought from the outside. If the information on a diskette is in archive (and recently programs and data are transferred from the computer on the computer only in such sort; even corporations-manufacturers of the software, for example Borland, pack production), it is necessary to unsqueeze it in the separate directory on a hard disk and at once, not postponing to start Dr. Web, having set it as parameter instead of a disk name a fully qualified path to this subdirectory. And still it is necessary even time in two weeks to make complete check of "hard disk" on viruses with the job of a maximum level of the heuristic analysis. As well as in case of with Aidstest at initial testing it is not necessary to allow to the program to treat files in which it will find out a virus as it is impossible to eliminate, that the sequence of byte accepted in an antivirus for the template can meet in the healthy program. If when done playing testings Dr. Web will produce messages that has found viruses, it is necessary to start it with an option/P (EU-whether this option has not been specified) to look, what file is infected. After that it is necessary to copy a file on a diskette or on the ram drive and to try to delete, having specified to " the Medical web » a key/F. At unsuccessful treatment it is necessary to act the same as in the similar situation described above for program Aidstest. For daily operation with diskettes it is possible to advise a following configuration: web /A/S2/V/O/U/H where/A - to check all files,/S2 - the heuristic analyzer,/V - to check infection with a resident virus,/O - to output message OK for not infected files,/U - to check packed (but not архивированные!) Files,/H - to test high memory. That all time to not type the same sequence of keys, it is possible to include in the menu of the user (USER MENU) NORTON COMMANDER shells (or ДОС-НОВИГАТОР if it is used last) items of call Dr. Web and Aidstest or to create a batch file. It not only will save time, but also will allow to reduce size of variables of an environment of DOS as now it will not be necessary to specify in PATH command of file AUTOEXEC.BAT subdirectory with anti-virus programs (the some people do it for operative call to antiviruses).

AVSP (Anti-Virus Software Protection)

Interesting software product is antivirus AVSP. This program combines both the detector, and the doctor, and the auditor, and even has some functions of the resident filter (the prohibition of record in files with attribute READ ONLY). The antivirus can treat both known and unknown viruses at what the user can inform on a way of treatment last to the program. Besides AVSP can treat self-updated and Stealth-viruses (invisible beings). At start AVSP there is a system of windows from the menu and a state information of the program. The context-sensitive system of hints which gives the explanation to each choice is very convenient. It is called classically, key F1, and varies at transition from the item to the item. As not unimportant advantage in our century of Windows (OS/2) is support of the mouse. Essential disadvantage of interface AVSP - absence of possibility of a choice of choices pressing the key with the corresponding character though it is a little compensated by possibility to select the item, having pressed ALT and the digit corresponding number of this item. The structure of package AVSP includes also resident driver AVSP.SYS which allows to find out the majority of invisible viruses (except for viruses of type Ghost-1963 or DIR) to deactivate viruses for the period of the operation, and also prohibits to change READ ONLY files. It is installed classically, in file CONFIG.SYS. To place string in a file it is desirable more close to the beginning as in drivers the virus too can contain, and the more them the probability will be started prior to the beginning of operation AVSP.SYS, the above, that this driver will appear useless. AVSP.SYS it is possible to place at once behind drivers of managers of high memory (HIMEM, EMM386, QEMM, etc.) . For connection of protection READ ONLY of files in AUTOEXEC.BAT it is necessary to include string calling file AVSPMONI.EXE, as entering in a package, with parameter ON (naturally this string should be also one of the first) .Теперь at attempt to remove attribute or to write in READ ONLY a file the long signal and operation will sound will not be fulfilled. To remove protection it is possible or having started AVSPMONI.EXE c in parameter OFF, or in main program AVSP.EXE. For this purpose it is necessary to enter into the item « Research of changes in files » and to note the necessary files the spacebar (it is possible to note also group of files a key «+»). After that it is necessary to press key F8, and attribute READONLY will be removed. To put files under protection it is possible key F7. One more function AVSP.SYS - disconnecting for a while работыAVSP.EXE resident viruses, the truth together with viruses the driver disables also some other resident programs. For check of this fact I had been loaded two programs-parodies on viruses: One overturns the screen, and another transforms into streaming wave lines vertical straight lines (for example vertical programs Norton Commander forming panels). At start AVSP has returned the screen in a normal state, but "waves" on sides of frames have remained, the truth they and did not move, and stood on a place. By call of other choice side its direct frames also turned in wavy, though also motionless. From this it is possible to draw output, that AVSP not completely disables resident programs. Behaved ADinf more strange: having made in the "turned" sort it has produced testing, that viruses it is not revealed, then "has hung" (the truth to quit this state it was possible keys CTRL/BREAK). At first start AVSP it is necessary to test system on presence of known viruses, having selected choices « Search and deleting of viruses » and « Complex check ». Thus the RAM, BOOT-sector and files is checked. After that (if viruses it is not revealed) it is necessary to create data tables about files and system areas, having selected basically the menu the item « Data about files and viruses » and a submenu « Creation of datafiles ». Thus on a disk in the directory/AVSP files DISKDATA.DTL (data about the sizes and check totals of files), MBOOT.DTL (copy Master Boot of sector) and BOOT.DTL (a copy of DOS Boot of sector) will be created. Now at complex check AVSP will compare disk files to the information containing in these datafiles. This information can be used for the analysis of the changes which have occured in files and Boot-sectors, and also for search and treatment of unknown viruses. And in some cases it is possible to restore even the files spoiled by a unknown virus. To specify to the program what exactly needs to be checked, the user can by means of the item "Parameter setup". It is possible to install check of the sizes of files, their check totals, presence in them of viruses, or all this together. For this purpose it is necessary to install "flags" opposite to appropriate items. As it is possible to specify, what exactly to check (Boot-sector, memory, or files). As well as in the majority of anti-virus programs here possibility to select between speed and quality is given to the user. The essence of high-speed check consists that all file but only its beginning is viewed; thus it is possible to find out the majority of viruses. If the virus is written to the middle, or the file is infected by several viruses (thus "old" viruses are as though pushed aside in the middle "young") that the program it and will not notice. Therefore it is necessary to install optimization on quality as in AVSP qualitative testing borrows not much more time, than high-speed. All operations, for example, search of viruses, can be made on a current disk (by default), on current path, and also on all disks. To change path or a disk it is necessary to press key TAB. During operation the information on path is output in the upper left corner. For check of a computer on presence of known viruses it is necessary to select basically the menu the item « Search and deleting of viruses ». After that it is possible to select or a mode « Stock-taking of viruses », or a mode « Complex check ». In the first case check of files and boot sectors on known viruses will be made, and in the second - will be checked up not only files and BOOT-sectors, but also memory. Besides the program will compare a state of system to the data saved in files DISKDATA.DTL , MBOOT.DTL and BOOT.DTL. At first the program will make preliminary pass for an estimation of size of forthcoming operation, and then will view all program files. At any moment the user can press ESC for interruption of review or a blank for suspend. By default AVSP checks the sizes of files. If the size is changed, the check total is checked and the card of change of a file is under construction. If a file new it is checked on presence of known viruses. During check of a disk in a window allocated in the right part of the screen various messages, for example, about resizing a file can be output. After check all of them can be viewed having selected in the menu the item « Review of Messages ». The message on suspicious files can be sometimes produced. It means, that to some tags it is possible to judge that or the file is infected by a new virus, or it earlier has been infected by it, but after treatment characteristic tags for a virus have remained. Such message is produced also about files, for which strange time of creation. For example for me AVSP time создания3:53.60 "swears" on file PCXSHOW.EXE, for which. As the antivirus does not like the programs transferred from computer БК-0011М. The matter is that the majority of the disk operating systems applied on БК (such, as operating system the NORTH, НОРТОН, etc.) Do not write in the directory a creation date and the utility upgrading a diskette for operation from MS-DOS writes the number corresponding date 0.0.80 in appropriate cells of the directory. Here AVSP the message « the Nonexistent creation date also produces, the virus is possible! » That fact is interesting, that the antivirus "does not swear" on the demo program (AVSP_DEM.EXE), for which date создания11.11.2011 year, and time 11:11, moreover besides the size – five шестёрок. Possibly at writing the program the author has recollected, that else there are out-of-date computers for which is not present CMOS and date is entered at loading. At complex check AVSP outputs also names of files in which there were changes, and also a so-called card of changes. If for the majority of the changed files it identical, most likely, in system any virus "has crept in". More often the program itself "will suspect" of such situation wrong and will suggest to bring the information on it in library. Thus the template of a virus it will be automatically selected. At autodetection of new viruses AVSP can accept set of errors. Just those days when I was engaged in writing of the abstract, with me there was such case. At check of hard disk AVSP has produced the message « the unknown virus Is found! « Also has produced inquiry about filing the template of a virus in library. Having looked addressed to a file, I at once have understood, that presence in it of a virus is improbable, as it was self-unsqueezed archive RAR-and which I have created some minutes prior to start of an antivirus, перепаковав two files, one of which was also SFX-archive with the same name, as turned out. Having decided to look, that will be further, I have installed an option of creation of the report and have repeatedly started complex check. Here a fragment of this report:

Directory _ C:TOOLSUTILIT_ SPEED200. EXE: New_ TB.EXE: New


Directory _ C:DISK_ARH_ DERIVE.EXE: Изменен-Resizing: 22053 (was 170496, became 192549) - the Possible virus: TP-940128 Card of change:----------------¦

After inquiry answer AVSP about filing a virus in library, the program has displayed made by her the template. Дизассемблировав key TAB a code of the template I have seen a following routine: push es push cs pop ds mov cx, [000ch] mov si, cx dec si Such routine, and especially two first (saving of appropriate registers) meet in the beginning of many исполнимых programs. At restart of complex check AVSP "found" a virus in each second EXE-program:

Directory _ C:ANTIVIR_ AIDSTEST.EXE: Заражен-Virus ERU-37

Directory _ C:ANTIVIRADINF_ REVIS.EXE: Заражен-Virus ERU-37

Directory _ C:DOS_ MEMMAKER.EXE: Заражен-Virus ERU-37

_ MSAV.EXE: Заражен-Virus ERU-37


So at autodetection of the template it is necessary to not be too lazy to check up, whether really it is a virus and whether this the template will meet in healthy programs. If during AVSP will find out a known virus it is necessary to undertake the same operations, as well as by operation with Aidstest and Dr. Web: to copy a file on a disk, to reboot with backup diskettes to start AVSP. It is desirable also that thus in memory driver AVSP.SYS as it helps the main program to treat Stealth-viruses has been loaded. After that it is necessary to select the choice » Deleting of viruses ». If in library of program VIRUSES.INF there is an information on how to treat the given virus the file will be cured, and AVSP will produce the corresponding message. At absence in library of the information on a way of treatment of the given virus the program will try to restore automatically a file by means of the information saved in datafiles DISKDATA.DTL. If a file to cure that will not be possible, it is possible вирус-"invisible being". To learn more in detail that for a virus "has climbed" in system it is possible in the browse mode of messages. For this purpose it is necessary to bring the cursor on the name of a virus and to press ENTER. If automatically a file to restore that was not possible is possible or to delete, as always, it or to try to train independently AVSP to delete a virus. The truth for writing "medicine" even on the macrolanguage AVSP it is necessary to have experience in system programming and to know even elements of the assembler. In fact and in medicine of a tablet in inept hands bring more harm, than advantage. If the user has a modem it can transmit in a network « the electronic declaration » with a question on a way of treatment of a virus. Thus it is necessary to select known enough servers, instead of amateur BBS, in which лазают only fans GIF and jokes about the lieutenant Rzhev. For depositing and editing of the information on viruses in the menu » Data about files and about viruses » are a submenu « Change of the information on viruses ». At a choice of this item the program displays the list of all viruses known to it. Under the list it is possible to move by means of arrows. To receive more complete information on a virus, it is necessary, having brought the cursor to its name it to press ENTER. All this information is in file VIRUSES.INF which can be edited not only by means of AVSP in the item « Change of the information on viruses » but also as a usual text file. To bring the information on a new virus by means of AVSP it is necessary to press F2 , the program will ask about a name of a virus and when the user will enter this name, the program will produce the table similar to those that is output at the automatic job of the template. In this table it is necessary to bring all known data about this virus. In AVSP there is a possibility to set the template not only usual, but also self-updated viruses. It is carried out by means of characters of substitutes in the mnemonic commands also making the macrolanguage of an antivirus. Experimental programmers can bring also the sequence of macros setting a way of treatment of a file. At any moment it is possible to refuse editing, having pressed ESC or to write the information in library, having pressed ENTER. But, certainly, completely all possibilities of the program are realized in hands of the person familiar with the assembler and system programming. In AVSP there is a possibility to view files in different formats. At an input in the browse mode on the screen two columns are output: at the left contents of a viewed file in the form of hexadecimal codes, and on the right - in the form of ASCII-codes. Except for that the useful system information which will help at writing procedure of deleting of a virus is output. Moving the cursor, it is possible to pass to any address, there are also lookup functions of templates, matchings of files. It is possible to install, in what format the header will be viewed, for example: as for an EXE-file, a SYS-file or in a format of boot sector. Thus review of header is well realized: its system cells are presented in the form of the table: at the left value of a cell, on the right - the explanation. One more useful function is the built in disassembler. Whether with its help it is possible to understand there is in a file a virus or at check of a disk there was malfunctioning AVSP. Except for that it is possible to try to clarify a way of infection, a principle of operation of a virus, and also a place where it "has hidden" substituted байты a file (if we deal with such type of a virus). All this will allow to write procedure of deleting of a virus and to restore запорченные files. For complete happiness does not suffice only трассировщика though in inept hands such function can lead to infection still a lot of data. In a mode of a disassembler between mnemonic commands it is possible to move, using arrows. To pass on the offset specified in the branch instruction, it is necessary to press key F7. One more useful function - output of an evident card of changes. Especially clearly I have understood it, when I had a suspicion concerning one of files (which should not, like to vary) in auditor ADinf in whom there is no such function. The card of changes allows to estimate, whether there correspond these changes to a virus or not, and also to narrow down a search area of a body of a virus at дизассемблировании. At its construction the red rectangle is used for the map of the changed block, dark blue - not changed, and transparent - new. If there is a suspicion, that into system has got Stealth - a virus, it is possible to start AVSP with parameter/D from a hard disk, and then to boot from pure operating system boot diskette and to start AVSP without parameters. If results of check of check totals differ in both cases suspicions are justified. In program AVSP there are two algorithms of neutralizing of "invisible beings" and both of them work only at presence of an active virus in memory. That occurs at implementation of these algorithms similar on film of horrors or a doomsday: all files are copied in datafiles, and then erased. Files with attribute SYSTEM are rescueed only. In Adinf process of deleting Stealth is realized much easier. Can, certainly, the way of struggle against "invisible beings" in AVSP and is more reliable, but somehow it not especially pleasant entertainment - to plough up all "screw", in addition and unsafe. Program AVSP inspects as well a state of boot sectors. If the BOOT-sector on a diskette is infected and the antivirus cannot cure it it is necessary to erase a load code. The diskette thus becomes not system, but data thus will not be lost. With "hard disk" so valiantly to act it is impossible. At detection of changes in one of BOOT-sectors of hard disk AVSP will suggest it to save in some file, and then will try to delete a virus. If it is program to make it will not be possible, it will suggest to restore a former state of boot sector. In general, - a thing whimsical, therefore before similar operation it is desirable "to throw off" "hard disk" the necessary data on diskettes. What to speak about operations with BOOT-sectors if there were cases when "screw" «самоочищался» at involvement Speed Disk and Disk Fix . The truth to the one who treated by means of AVSP Стелз-viruses already nothing terribly.

Microsoft Antivirus

The structure of modern versions of MS-DOS (for example 6.22) includes the anti-virus program of Microsoft Antivirus (MSAV). This antivirus can work in modes of the detector-doctor and the auditor. MSAV has a user-friendly interface in style of MS-Windows, naturally, the mouse is supported. The context-sensitive help is well realized: the hint is practically to any choice, to any situation. Access to choices is universally realized: for this purpose it is possible to use arrow keys, key keys (F1-F9), the keys corresponding one characters of the name of the item, and also the mouse. Flags of installations in Options choice it is possible to install both a key the BLANK, and the enter key. Серьёзным inconvenience at usage of the program is that it saves tables with data about files not in one file, and scatters them on all directories. Here files CHKLIST.MS also wander at an exchange of programs from the user to the user, littering the directory and a place on a disk. At start the program loads the own character generator and reads a directory tree of a current disk then quits in the main menu. Not clearly, what for to read a directory tree at once at start: in fact the user can and not want to check a current disk. In the main menu it is possible to replace a disk (Select new drive) to select between check without deleting viruses (Detect) and with their deleting (Detect*Clean). At start of check of a disk (both in a mode of deleting, and without it) the program all over again scans memory on presence of viruses known to it. Thus indication of the done operation in the form of a color strip and percent of performed operation is output. After scanning memory MSAV is accepted to check of directly disk. At first check MSAV creates in each directory containing исполнимые files, files CHKLIST.MS in which writes the information on the size, date, time, attributes, and also the check total of inspected files. At the subsequent checks the program will compare files to the information in CHKLIST.MS - files. If the size and date the program will inform on it to the user have varied and will request about further operations: to update the information (Update), to install date and time in correspondence with data in CHKLIST.MS (Repair), to continue, not paying attention to changes in the given file (Continue) to interrupt check (Stop). If the check total MSAV will output the same window has varied, only instead of Repair item Delete item will (delete), as the program cannot restore contents of a file. At detection of a virus in mode Detect*Clean the program will delete this virus. Check of a disk in both modes can be suspended, or completely to interrupt, having pressed ESC (or F3) and answered an appropriate question of the program. During scanning a disk the information on the done operation is output: percent of the handled directories and percent of the handled files in the current directory. This information is produced also evidently, in the form of a color strip, as well as at check of memory. In the end of check MSAV produces the report in the form of the table in which it is informed on quantity of the checked up hard disks and floppy disks, about quantity of the checked up, infected and cured files. Except for that time of scanning is output. In menu Options it is possible to configure the program at own will. Here it is possible to install a mode of search of stealth viruses (Anti-Stealth), checks of all (and not just исполнимых) фай-лов (Check All Files), and also to resolve or prohibit to create tables CHKLIST.MS (Create New Checksums). Besides it is possible to set a mode of saving of the report on the done operation in a file. If to install option Create Backup before deleting of a virus from the infected file its copy will be saved with VIR extension Being basically the menu, it is possible to view the list of the viruses, known to program MSAV, having pressed key F9. Thus the window with names of viruses will be output. To look more detailed information on a virus, it is necessary to bring the cursor to its name and to press ENTER. It is possible to pass fast to an interesting virus, having typed the first characters of its name. The information on a virus can be output on the printer, having selected the appropriate choice.

ADINF (Advanced Diskinfoscope)

ADinf concerns to a class of programs-auditors. The antivirus has a high speed of operation, is capable to resist with success to the viruses which are being memory. It allows to inspect a disk, reading it on sectors through BIOS and not using system traps of DOS which the virus can intercept. Program ADinf has received the first prize at the Second All-Union competition of anti-virus programs in 1990, and also the second prize at competition BorlandContest ' 93. Unlike AVSP in which the user should most parse, whether the computer is infected by a Stealth-virus, booting all over again from the hard disk, and then with standard diskettes, in ADinf this operation occurs automatically. It occurs owing to original algorithm of counteraction by it вирусам-to "invisible beings" which essence consists that all over again the disk is read directly through BIOS, and then - by means of DOS. If the information will differ, in system Stelz - a virus. ADinf was a unique antivirus which in the summer of 1991 has found out virus DIR constructed on essentially new way of infection and masking. To treatment of the infected files it is applied ADinf CureModule unit not entering into package ADinf and delivered separately. A principle of operation of the unit - saving of the small database describing inspected files. Working jointly, these programs allow to find out and delete about 97 % of file viruses and 100%вирусов in boot sector. For example, sensational virus SatanBug has been found easily out, and the files infected by it are automatically restored. And, even those users who have gained ADinf and ADinf Cure Module some months prior to appearance of this virus, could save of it without effort. More in detail I cannot tell anything about the treating unit, as for me it is not present. Unlike other antiviruses Advansed Diskinfoscope does not demand loading with standard, protected from record of a diskette. At loading from the hard disk reliability of protection does not decrease. ADinf has well fulfilled user-friendly interface which unlike AVSP is realized not in text, and in a graphic mode. The program works directly with video-memory, passing BIOS, thus graphics adapters are supported all. Presence of a plenty of keys allows the user to create configuration of system as much as possible convenient for it. It is possible to install, what exactly needs to be inspected: files with the set extensions, boot sectors, presence of the bad clusters, new files on presence of Stealth-viruses, files from the list invariabl ит.д. At the desire the user can prohibit to check some directories (it is necessary if directories are workers and in them all time there are changes). There is a possibility to change a way of access to a disk (BIOS, Int13h or Int25h/26h) to edit the list of extensions of checked files, and also to assign to each extension an own browser by means of which files with this extension will be viewed. Also there are various additions of type of upgrade together with tables and file TREEINFO.NCD (this file реализовывает possibility of fast transition on a directory tree in program Norton Commander). In traditions of the modern software operation with the mouse is realized. As well as all production of the corporation « Dialogue the Science », ADinf supports hardware-software Sheriff complex. At installation ADinf in system there is a possibility to change a name of main file ADINF.EXE and a name of tables, thus the user can set any name. It is very useful function as recently there was a set of the viruses "hunting" antiviruses (for example, there is a virus which changes program Aidstest so, that it instead of a picture of the corporation « the Science » writes Dialogue: « Lozinsky - a stub »), including for ADinf. Useful function is possibility of operation from DOS not quitting from the program. It happens it is useful, when it is necessary to start an external antivirus for treatment of a file if the user does not have treating block ADinf Cure Module. One more interesting function - prohibition of operation with system at detection of changes on a disk. This function is useful, when behind terminals the users who are not having still wide experience in dialogue with a computer work. Such users on ignorance or on a negligence can ignore message ADinf and continue operation indifferently, that can lead to heavy consequences. If the key-Stop in string of call ADinfAUTOEXEC.BAT at detection of changes on a disk the program will demand is installed to call the system programmer servicing the given terminal and if the user will press ESC or ENTER the system will reboot also all will repeat again. And still this function is thought not out, as continuation of operation probably at pressing the key F10. In fact the majority of users even if they for the first time have sat down for a computer, even at the minimum desire on that can continue operation, having taken advantage of " a rule of scientific test », that is having pressed on all keys successively. For rise of reliability of protection against such users it would be necessary to enter even any unpretentious password. The principle of operation ADinf is grounded on saving in the table of copy MASTER-BOOT and BOOT sectors, the list of numbers of bad clusters, the circuit of a directory tree and the information on all inspected files. Besides the program remembers and at each start checks, whether accessible DOS size of the RAM (that happens at infection with the majority of load viruses), quantity of the installed hard disks, property sheets of the hard disk in the field of variables BIOS has varied. At the first start the program remembers size of the RAM, finds and remembers the address of interrupt handler Int 13h in BIOS which will be used at all subsequent checks, and builds tables for checked disks. Thus it is checked, whether showed interrupt vector 13h in BIOS before loading of DOS. At subsequent starts ADinf checks size of the RAM accessible to DOS, variables BIOS, boot sectors, the list of numbers of bad clusters (as some viruses, having written in a cluster, mark it as fail that they were jammed by other data, and also have not found out primitive antiviruses). Besides the antivirus searches for again created and deleted subdirectories new, the remote, renamed, moved and varied files (change of length and the check total is checked). If ADinf will find out, that, the file from the list invariabl has varied, or in a file have occured has varied without change of date and time, and also presence for a file of strange date (the number is more 31, month is more 12 or year more current) or time (minutes more than 59, there are more than hours 23 or seconds more than 59) it will produce the warning that the virus infection is possible. If changes of BOOT-sectors it is possible to compare system tables which were before change in dialog mode are found out, and at will to restore former sector. After restoring the changed sector is saved in a disk file for the subsequent analysis. New bad clusters (the information on them in FAT is more true) can appear after start of any utility treating a disk (for example NDD) or owing to operations of a virus. If ADinf has produced the message, and the user did not start any similar utilities most likely the virus has got into a computer. At obtaining such message it is necessary to continue check, closely watch all messages on changes of files and boot sectors. If in system really virus such messages will not keep itself waiting long (in fact if all body of a virus will be in a "fail" cluster, handle) will never be transferred it. After check ADinf produces a pivot table informing on changes on a disk. Under the table it is possible to move arrows and to view the detailed information, having pressed ENTER on the interesting item. There is a possibility of transition to any item by means of "fast" keys. The varied files can be viewed in a classical mode (a hexadecimal dump / ASCII-codes) by means of the built in browser which reads a disk through BIOS. It is possible to take advantage also of an external browser preliminary having specified to it path. Having connected the external editor, it is possible to edit the varied file. Not absolutely habitually the form in which ADinf informs on the found out suspicious changes looks: instead of output of the message on concrete changes it outputs a red window with the list of all possible and marks with a tick items, to the respective alterations which have occured at the moment. If after obtaining such message to press ESC the program will request about further operations: to update the information on a disk, to not update it, to treat (at presence of treating ADinf Cure Module unit) or to write the protocol. For treatment it is possible to take advantage of an external antivirus, having loaded it from a window of operation from DOS which is called by shortcut key ALT+V. If changes do not concern to bit suspicious after output of the table of changes it is possible to press ESC. Thus the program will ask, whether it is necessary to update data about a disk in tables or not necessary, and also whether it is necessary to create a file in the report on the done operation. After a choice of one of items the program fulfils the demanded operation and completes the operation.

Attacks of fishers!!!

Fishers prefer to send the messages, first of all, people with incomes more than 100 thousand dollars a year, are informed with site Dark Reading referring to research of company Gartner. People with the incomes expressed in six--place numbers, have informed, that have received on the average on 112 letters from fishers for a year. The average user received on 74 fishing-letters for a year. Thus the average size of the loss suffered by rich users, has made 4632 dollars — in 4 times more, than the usual user lost.
On results of the second half-year 2005 and the first half-year 2006, the basic victims of fisher became users of systems online-banking. The British association of payment systems (APACS) approves, that losses of the British users in the first half-year 2005 have made about 27,7 million dollars. In the first half-year 2006 the sum of these losses has reached almost 43 million dollars.
Since 2004 the number of the American users who have received the fishing-letters, has grown from 57 million up to 109 million person. Financial losses from fishing in the USA thus have reached 2,8 billion dollars. In turn, APACS confirms high rates of growth of activity of fishers in the Great Britain. From 312 cases in the first half-year 2005, the number of the fixed fishing-attacks has reached 5059 in the first half-year 2006.
« Good news that smaller quantity of users have recognized itself as victims of fishers. However, thus those who all the same has given the money to swindlers, has lost more, than victims of the last years. The size of average losses for last year has increased almost in 5 times », — has noted vice-president Gartner Avivah Litan. As she said, attacks become more inventive.
Fishers start to depart from direct attacks of on-line bank systems and do an emphasis on less widespread brands, and also use difficultly defined methods of social engineering », — has emphasized Litan. As an example it has resulted a manner of criminals to simulate other structures using bank data of users — payment systems like PayPal.
Methods of protection from fishing become better, however still cannot stop attack completely. « Counter-measures like systems of definition fishing applied by banks, providers and other companies obviously are not widespread enough and effective », — speaks Litan. Not strongly improve a situation and updatings of browsers. « Many browsers updatings still are not completed. At least, two more years the number of fishing-attacks will grow, as are profitable business », — has noted Litan.
Authors of researches APACS and Gartner as most effectual measures against fishing have named formation of users it is necessary for them to explain, how much important to not open electronic letters from unchecked sources. APACS besides urgently recommends users to type addresses of resources in an address line of a browser manually instead of to use references and to make online-purchase only on sites with SSL-certificates.

NEW Email-Worm

Kaspersky Lab has detected mass mailings of new variants of Email-Worm.Win32.Warezov, which started at 5am Moscow time (GMT +3), 22nd November 2006.

A new version is being sent out in each mass mailing. The variants are all highly similar, and spread as an attachment to infected emails. Once launched, they may terminate antivirus and firewall programs and download other malware.

The latest variants are Email-Worm.Win32.Warezov.gl and Email-Worm.Win32.Warezov.gj. A full description of Email-Worm.Win32.Warezov.gl is available in the Virus Encyclopaedia.

Antivirus updates have been released for all the latest variants. Users are strongly recommended to ensure that they keep their antivirus software up to date.

If you are using Kaspersky Anti-Virus 6.0, enable Proactive Protection, and new variants will be detected without the need to update antivirus databases.

Thursday, November 23, 2006

Whether you trust in New Panda Antivirus 2007?

New Panda Antivirus 2007 does protection of your personal computer as much as possible simple since it automatically blocks and destroys all types of viruses and spies. Now you can wander on the Internet, send and accept e-mail, play games, скачивать files, communicate in a chat … and to be quiet for the safety.
Moreover, the product represents the easy and highly effective decision so your computer works more quickly!
And still: now, at the order of each product Panda Antivirus 2007 you receive protection on 2 personal computers!
Key characteristics
Automatically finds out and deletes all types of viruses
Viruses, worms and Trojans develop constantly and modernized. For today they are developed with the purpose of infection of your personal computer without any notice. Panda Antivirus 2007 automatically finds out and deletes these threats to make your personal computer protected from viruses.
Forget about infections!
Protects your personal computer from spies
The Internet is overflown by espionage programs which can get in your personal data and steal the information, confidentially observe of yours online-activity. Spies can slow down also work of your personal computer as a result of annoying display of advertisements in pop-up windows, and also change of computer adjustments.
Panda Antivirus 2007 automatically defines and completely deletes espionage programs and other annoying programs.
Protect the personal information!
Protects from online-swindle
New complex technics online-swindle appear every day. They are developed with the purpose to obtain your registration data, numbers of accounts and other data who then can be used for theft of your money or identification.
Panda Antivirus 2007 will hold you protected from such dangerous threats. Work about the Internet-bank and-or carry out purchases in online-shops, being completely quiet for the safety.
Automatic daily updatings
The product is automatically updated, at least once a day to protect your personal computer from viruses, spies and other threats.
Technical support
Experts of our technical support and experts PandaLabs are always ready to give to you a prompt reply to your inquiries.
System requirements
The processor: Pentium 150 MHz and is faster
Memory: 64 MB
Hard disk: 110 MB of an empty seat
Operational system: Windows XP, 2000 Pro, Me, 98