F Best free antivirus software and antivirus software reviews

Best free antivirus software and antivirus software reviews

Best free antivirus software - what's it, where to find it and how to download or buy it. I'll try to find for you a lot of different antispyware and antivirus software products


Open VPN

Friday, December 15, 2006

Largest search services are hazardous to health of your computer

The well known developer of the anti-virus software company McAfee has examined search delivery of five largest search services: Google, Yahoo, MSN Live, AOL and Ask.com on the basis of 2500 popular keywords.
Results of research have appeared unfavourable - on each one hundred the sites which are given out search services by inquiry of the user, it is necessary on the average 4,4 traps, ready to lard a computer of the visitor viruses, worms and trojans. In spite of the fact that in comparison with data of May, 2006 delivery of the majority of search systems became more safe on 12 %, the reference to them still reminds walk on a mine field.
The most dangerous inquiries which result the trustful user on the sites menacing to safety of its computer, have appeared words of type "freebie", "free" and to it similar. Not less dangerous there were also inquiries of fans of porno. Besides it was found out, that to the greatest risk to get on a dangerous site the users trustfully clicking on contextual advertising, accompanying delivery are subject: probability to dig into a trap in this case three times above, than in case of with the usual sites which have got in results of search.

Monday, December 11, 2006

Technorati Test

Technorati Profile

Friday, December 08, 2006

How Can Anti-Virus Software Keep My Data Safe?

It’s getting harder everyday to protect your data from the dangers posed by computer viruses. These malicious programs have evolved into multiple forms and can be contracted through a variety of ways, including opening email attachments, clicking on spam or by visiting corrupt websites.

Fortunately, just as viruses have grown in strength and complexity over the years, so also have the tools used to combat them. With the latest generation of anti-virus software, you can give your computer a level of protection never before possible.

Today’s best anti-virus software come with multiple virus scans, allowing you to schedule scans in advance, giving you access to a variety of location-specific scans and even real-time scanning, which scan your computer every few minutes for viruses—stopping them before they can do damage.

And, since new viruses are being created everyday, the most effective anti-virus programs offers convenient virus updates. Some software even offer automatic updates, which regularly and automatically check back with the manufacturer for information on new viruses, providing you the highest-level of protection at all times.

However, undeniably, the most valuable thing that today’s anti-virus software brings to its consumers is plain, good-old-fashion peace of mind.

In this site, you'll find articles on computer virus topics, news stories and comprehensive anti-virus software reviews that will help you make an informed decision on which anti-virus program is right for you. At TopTenREVIEWS – We do the research so you don't have to.™

Browser security test

Check your browser's security.

Tuesday, December 05, 2006

Political Jokes (about viruses)

Computer Viruses

The following information is from credible intelligence sources on the latest viruses sweeping across our nation's information superhighway, so take extreme caution and be on high virus alert at all times!

THE GEORGE W BUSH VIRUS - Causes your computer to keep looking for viruses of mass destruction

THE JOHN KERRY VIRUS - Reverses every position each time you turn your computer on

THE AL GORE VIRUS - Causes your computer to keep counting, recounting, recounting ... ad nauseam

THE BILL CLINTON VIRUS - Gives you a permanent hard drive, with no memory

THE BOB DOLE VIRUS - Makes a new hard drive out of an old floppy

THE LEWINSKY VIRUS - Sucks all the memory out of your computer, then emails your best friends about what it did).

THE RONALD REAGAN VIRUS - Saves your data, but forgets where it is stored

THE JESSE JACKSON VIRUS - Warns you constantly about illegitimate file reproduction, while illegitimately reproducing files in the background and rhyming it all

THE MIKE TYSON VIRUS - Quits after two bytes

THE OPRAH WINFREY VIRUS - Your 300 mb hard drive shrinks to 100 mb, then slowly expands to restabilize around 200

THE JACK KEVORKIAN VIRUS - Deletes all old files

THE PROZAC VIRUS - Totally screws up your RAM, but your processor doesn't care

THE JOEY BUTTAFUOCO VIRUS - Only attacks minor files

THE ARNOLD SCHWARZENEGGER VIRUS - Terminates some files, leaves, but will be back

THE MICHAEL JACKSON VIRUS - Attacks only minor files

THE LORENA BOBBITT VIRUS - Reformats your hard drive into a 3.5 inch floppy, then discards it through Windows

MSRP - one more interesting program for search the viruses.

One more interesting program for search of viruses, but in my opinion the price is very high for this product.

Here the description from the main site:

Anti-virus, anti-spam, and client firewall
Protection for Windows, Macs and Exchange email servers
Stops viruses, spyware, hackers and spam
Installs quickly and is easy to use
Includes 24/7 support

Shortly I shall put this anti-virus program on a test computer and about results of testing I shall write later.

Excellent anti-virus product

The founder of this anti-virus product (AVZ) - the Russian programmer, that is why the site in Russian so if there will be difficulties contact me and I shall try to help you.

Base target of AVZ is SpyWare and AdWare modules, Trojan programms, BackDoor modules, Warms and TrojanSpy, TrojanDownloader, TrojanDropper.

Pluss of this anti-virus product:
Free product.
Very simple to use.

Friday, December 01, 2006

MSN promises to kill all SEO spammers sites.

Search engine spamming (or search spamming or web spamming [1]) refers to the practice of using questionable Search Engine Optimization (SEO) techniques to improve the ranking of a website in search engine listings. Comment spamming (or blog spamming) is a form of search spamming in which random comments, promoting links to commercial services, are automatically posted to publicly-accessible forums, guest books, blogs, message boards, etc. See sample screenshots of URLs hosted on auto-review.net, webspawner.com, ripway.com, etc. being spammed at many open forums. There are now several commercial programs that automate such spamming tasks.
To make their URLs look more legitimate so that search users are more likely to click the links, many spammers create doorway pages on reputable domains and use their URLs in comment spamming. When a user clicks on a doorway-page link in search listings, her browser is instructed to either redirect to or fetch ads listing from the actual target page, potentially operated by the spammer. See sample screenshots of doorway-page URLs hosted on mywebpage.netscape.com, tripod.com, geocities.com, angelfire.com, hometown.aol.com, groups.yahoo.com, etc. being spammed at many open forums. Also see an example of Google spammed by “freett.com” URLs.
Many search spammers set up doorway pages on blog websites such as blogspot.com, blogstudio.com, blogdrive.com, ebloggy.com, blog4ever.com, blogspirit.com, etc. Such doorway pages are a form of spam blogs (splogs). (See screenshots of sample splogs hosted on several blog websites.) Our preliminary investigation shows that splogs hosted on blogspot.com appear to be particularly widely spammed and effective against search engines: see

A picture illustrating how splog doorway pages work;

A long (partial) list of forums and guest books spammed by splog URLs hosted on blogspot.com;

Screenshots of Google search results spammed by blogspot.com splog URLs;

Screenshots of Yahoo! search results spammed by blogspot.com splog URLs;

Screenshots of MSN search results spammed by blogspot.com splog URLs.

A common approach to detecting spam web pages is through content analysis based on classification heuristics [2,3]. In this report, we propose an orthogonal context-based approach that uses URL-redirection analysis. Our work was primarily motivated by two key observations:
1) Many spam pages use cloaking and redirection techniques [1,4] to serve up a different page to search-engine crawlers than will be seen by human users. A common technique is to present to the crawler some page content that will be dynamically rewritten by the browser before the page is displayed to the users. Some spammers even use obfuscated scripts to make it impossible for crawlers to figure out how the pages will be rewritten. (See examples and analysis of actual cloaking techniques used by major spammers.) Our approach is to treat each spam page as a dynamic program rather than a static page, and utilize a “monkey program” [6] to analyze the traffic resulting from visiting each page with an actual browser so that the program can be executed in full fidelity.
2) Many successful, large-scale spammers have created a huge number of doorway pages that either redirect to or fetch ads from a single domain that is responsible for serving all target pages. By identifying those domains that serve target pages for a large number of doorway pages, we can catch major spammers’ domains together with all their doorway pages and doorway domains.
We call our approach the Search Defender approach. It consists of two steps:
1. Starting with a seed list of confirmed spam URLs, the Spam Hunter supplies them as search terms (or “link:” query terms) to search engines to locate the forums and guest books at which they were spammed, gathers additional URLs from each of these pages to grow the list, and does this iteratively until the list “converges”, i.e., the list no longer grows significantly after a query iteration.
The list automatically generated from the above step is only a list of “potential” spam URLs because there can be false positives. For example, some spammed forum pages may contain earlier comments from actual users that include non-spam URLs; spammers may intentionally intersperse non-spam URLs with spam ones.
2. To filter out false positives, we feed the list of potential spam URLs to the Strider URL Tracer (which we have previously released to help trademark owners find typo-squatting domains of their websites [5]). The tracer provides a key functionality called the Top Domain view: given a list of (primary) URLs, the tracer launches an actual browser to visit each URL and records all secondary URLs visited as a result. At the end of the batched scan, the Top Domain view provides the list of third-party domains that received secondary-URL traffic and rank them by the number of primary URLs that generated traffic to them. If the input is a list of potential spam URLs, the Top Domain view essentially highlights those target-page domains that are associated with a large number of doorway-page URLs. To further reduce false positives, we use the whitelist of legitimate ads syndicators and web-analytics servers that were heavy redirection-traffic receivers in our Strider HoneyMonkey scan of the top one million click-through URLs [6,7]. The ranked Top Domain list is then used to prioritize manual investigation. Once a third-party domain is determined to be a spammer’s domain, all doorway-page URLs associated with that domain are labeled as high-potential spam URLs.
Our Search Defender approach has two desirable properties that naturally turn the spammers’ spamming activities against themselves:
1. The more widely spammed a URL is, the easier it is for the spam hunter to find it. Once a spammed forum is identified, it becomes a “HoneyForum” that can be used to capture new spam URLs in new comment postings. Ideally, since there is a delay between spamming and its effect on search engine results, our spam hunter should be able to identify new spam URLs and notify the search engine before the URLs enter top search results.
2. The more doorway pages a spammer creates, the higher priority its target-page domain is placed on the Top Domain list for investigation.

Case Study #1: Analysis of Blogspot Spammers
Given over 17,000 blogspot URLs collected by the spam hunter, the URL Tracer identified these top-25 target-page domains that are behind a large number of blogspot splogs. The top six are particularly active: s-e-arch.com, speedsearcher.net, abcsearcher.com, eash.info, paysefeed.net, and veryfastsearch.com, which collectively were responsible for approximately 45% of the blogspot URLs. Screenshots of how the target pages look like and where their doorway URLs are spammed are shown here. In addition, we found that hundreds of these splogs generated traffic to googlesyndication.com (see an example). The “Fighting Splog” blog at http://fightsplog.blogspot.com provides a more comprehensive analysis of splogs that serve AdSense ads.

Case Study #2: Analysis of Blog4ever Spammers

Given 5,505 blog4ever URLs collected by the spam hunter, the URL Tracer identified 5,363 of them that fetched Google AdSense ads from googlesyndication.com. All of them included the client ID “ca-pub-6785940031399100” in the ads-fetching URLs and are most likely owned by the same spammer. See full report here.

Case Study #3: Analysis of Blogstudio Spammers

Given over 2,400 blogstudio URLs collected by the spam hunter, the URL Tracer identified two redirection target domains that are behind all these splogs: casino-web-search.com and finance-web-search.com. See full report here.

Case Study #4: Analysis of Proboards Spammers

Given over 1,300 proboards URLs collected by the spam hunter, the URL Tracer identified these top-8 target-page domains. The #1 paysefeed.net and #7 s-e-arch.com are also #5 and #1 on the blogspot list, respectively.

Case Study #5: Analysis of the “Money Spammers”

Given the hundreds of money-related, non-splog URLs collected by the spam hunter that contain keywords like “credit”, “loan”, “mortgage”, “insurance”, “finance”, “cash”, etc., the URL Tracer identified five redirection target domains that are behind a large number of doorway domains: finance-4u.com, finance-portal-4u.com, bankersnationalfinancial.com, finance-portal-online.com, and 1placeloan.com. See full report here.

Case Study #6: Analysis of the “.be Spammers”

Search Defender have found 3,854 doorway pages hosted on 109 .be doorway domains, all of which fetch ads from the target domain rills.be. See screenshots and the full list here.


We are in the process of fully automating Strider Search Defender. The main purpose of releasing this preliminary study is to raise awareness of this growing problem by providing a systematic analysis and proposing a solution so that the web community can start working together to combat this problem. We urge owners of blog sites and free hosting sites to actively monitor their websites to detect abuse. Similarly, advertisement syndicators can detect potential spammers by monitoring those customers who serve ads on a huge number of different URLs through a single account because it is highly unlikely that anyone can generate quality content at that scale. Second, although the content on some spam pages may actually have decent relevance, we urge search engines to consider removing such pages so as not to encourage web spamming. Third, we urge owners of publicly accessible forums (and guest books, etc.) to do a local search of “blogspot.com” and other spam-related domain names reported on this page to see if their forums have been abused and should be protected. For example, searching for “blogspot.com” at http://www.stat.ucla.edu/forums/search.php?f=325, or searching for “funpic.org”, or “yoll.net”, or “freett.com”, or “fc2.com” at http://coolplayer.sourceforge.net/phorum/search.php?f=2 would generate a large number of hits.

Finally, in some cases, the owners of the target-page domains may not be directly involved in the spamming activities of the doorway pages that redirect to them; their “affiliates” may be the ones who are actually performing the spamming. We urge the owners of such target-page domains to have a stronger rule that prohibits their affiliates from using spamming techniques to draw traffic.

Spam!!! Such letters I recieve every day near 200. I hate it.

P.S.: Spam filters worked correctly. What can I do in order to avoid such letters. Simply ignore it, I can't. Your advices please left in the comments or by mail with mark "ANTISPAM".