F Best free antivirus software and antivirus software reviews

Best free antivirus software and antivirus software reviews

Best free antivirus software - what's it, where to find it and how to download or buy it. I'll try to find for you a lot of different antispyware and antivirus software products

Google

Open VPN

Monday, February 12, 2007

Chain of Fools

What is it about chain letters that make otherwise insightful people blindly obey the instructions? Here's a classic that's hit my inbox dozens of times over the years: MAY OUR FRIENDSHIP NEVER COME APART ESPECIALLY WHEN IT'S STRAIGHT FROM THE HEART!
MAY YOU ALWAYS HAVE A RAINBOW OF SMILES ON YOUR FACE AND IN YOUR HEART FOREVER AND EVER!
FRIENDS FOREVER!

Forward this to at least 7 people and see what happens on your screen . You will laugh your head off!!!!!!!!!!!

This is the coolest thing I have ever gotten. All you have to do is send it to 7 people and watch your screen, it is the funniest clip. I can't tell you what is but I was laughing so hard I almost fell off my chair!!! So, send it to those 7 people and watch. !
The only person laughing is the person who originated this hoax. And here's a tip. Nothing is going to happen, except that 7 people you consider friends will be annoyed with you.

Antivirus expert: 'Ransomware' on the rise

Eugene Kaspersky, head of antivirus research at Russia's Kaspersky Labs, told the RSA Conference here Tuesday that the use of so-called "ransomware Trojans" is a key trend for 2007.

This malicious software infects a PC, encrypts some data and then displays an alert telling the victim to send money to get the decryption key needed to access their data again. Such malicious software isn't new. Early examples include Cryzip, discovered in March 2006, and GPCode, discovered in May 2005.

Cryzip and GPCode didn't cause massive damage, but Kaspersky believes cybercriminals will refine their use of ransomware Trojans this year. The final version of GPCode used a 660-bit encryption key, which should have taken a single powerful PC around 30 years to crack but was actually broken quickly by Kaspersky Labs, he said.

"We cracked it in 10 minutes," Kaspersky explained, "because this guy did not read the cryptographic book until the end. But if he does get to the end, antivirus vendors will not be able to decrypt and recover your data without help."

He also told the conference that distributed denial-of-service (DDoS) attacks--where a company's servers are bombarded with data in an attempt to drive it offline--are declining. This is partly because better filtering technologies have been developed that can strip out DDoS traffic before it reaches a corporate server. Another factor is the arrest of several people accused of extorting money from companies by launching a DDoS attack and demanding payment in exchange for stopping the attack.

"This is a dangerous kind of criminal activity, because the attack takes place before the money is transferred," Kaspersky said, explaining that victims of DDoS attacks have the opportunity to get the police involved before paying a ransom. One audience member pointed out that someone who falls victim to a ransomware Trojan could also get the police involved. However, Kaspersky said the police might not be very interested, as the ransom might be only $20 or $30.

Several U.K. online betting companies, including Betfair, were targeted with DDoS attacks in the summer of 2004. Later that year, nine Russian citizens were arrested over their alleged involvement in the crimes, and three were later sentenced to eight years imprisonment. However, the two suspected ringleaders are still at large.

Kaspersky said he is concerned that law enforcement is struggling to catch Internet criminals. "In 2004, there were around 100 arrests of suspected cybercriminals. In 2005, there were around 400. But last year, there were just 100. It seems that the stupid guys are being jailed, but the clever ones are still operating," he said.

Graeme Wearden reported for ZDNet UK in London.

Thursday, February 08, 2007

How to find antivirus and antispyware software

Step 1 - Go to the Overture, paste - antivirus, get results, such as:
1493835 anti virus software
310809 anti virus
169876 symantec anti virus
118785 anti virus protection
97788 norton anti virus
86539 spyware anti virus
80660 free anti virus
55495 avg anti virus
37385 free anti virus software
34999 free anti virus download
32077 2007 anti norton serial virus
24598 avg anti virus free
23735 free download norton anti virus
15224 avg anti virus free download
14793 anti virus download
14632 norton anti virus 2006
11661 avast anti virus
10308 panda anti virus
9677 free norton anti virus
9262 anti virus program
8740 free anti virus software download
8523 mcafee anti virus
8132 best anti virus
7747 kaspersky anti virus
7008 avg anti virus free edition
6331 free anti virus program
6265 2007 anti norton virus
5595 free anti virus protection
5575 yahoo anti virus
4970 norton anti virus update
4920 2007 activation anti norton virus
4870 norton anti virus download
4476 anti virus review
3937 anti virus gratuis
3859 best anti virus software
3394 avg free anti virus software
2998 norton anti virus software
2963 anti virus online
2896 free mcafee anti virus download
2783 anti virus free ware
2625 norton anti virus 2005
2337 anti virus gratuit
2304 ca anti virus
2301 avast anti virus free download
2291 best anti virus program
2241 microsoft anti virus
2183 anti virus gratis
2171 free anti virus scan
2138 anti virus software review
2118 free norton anti virus software
2115 avg anti virus update
2027 free mcafee anti virus
1986 6.0.0.303 anti kaspersky virus
1964 download kaspersky anti virus free
1960 symantec norton anti virus
1920 sbc yahoo anti virus
1912 anti virus scan
1911 avg anti virus download
1804 etrust anti virus
1774 anti virus free trial
1773 ez anti virus
1735 free download anti virus protection
1579 nod32 anti virus
1571 anti virus update
1561 avg anti virus software
1559 free panda anti virus
1551 norton anti virus free trial
1535 nortons anti virus
1494 avast anti virus free
1493 free microsoft anti virus program
1480 top anti virus
1450 best free anti virus
1432 download free anti virus program
1414 anti virus software download
1413 kaspersky anti virus 6.0
1399 anti avira virus
1395 sbc anti virus
1321 bitdefender anti virus
1292 avast anti virus download
1260 free anti virus spyware
1259 anti virus scanner
1230 housecall anti virus
1168 symantec anti virus free download
1122 anti download free spyware virus
1112 norton anti virus definition
1088 trend micro anti virus
1073 window anti virus
1061 anti virus rating
1057 norton anti virus 2004 serial
1046 mobile anti virus
1041 anti virus firewall
1032 2007 anti keygen norton virus
1030 symantec anti virus update
1012 mcafee anti virus download
1000 aol anti virus
997 norton anti virus gratis
978 anti virus solution
968 descargar anti virus gratis
961 trojan anti virus
946 norton anti virus protection,
or paste - antispyware and get:
5057 antispyware
3798 microsoft antispyware
1497 free antispyware
1090 microsoft antispyware download
742 window antispyware
667 yahoo antispyware
617 antispyware for win me
571 avg antispyware
476 free antispyware download
445 giant antispyware
360 microsoft antispyware beta
306 antispyware review
288 microsoft antispyware beta 1
286 microsoft antispyware free download
276 antispyware software
241 best antispyware
238 free antispyware software
232 mcafee antispyware
215 antispyware beta
201 antispyware download
197 microsoft window antispyware
174 antispyware center security software spyware window
159 antispyware ashampoo
152 free microsoft antispyware
147 ms antispyware
126 norton antispyware
120 anti antispyware seo share virus ware
114 trend micro antispyware
112 antispyware super
101 antispyware avg free
97 antispyware gratis
93 antispyware tool
93 yahoo antispyware toolbar
91 free antispyware program
87 antispyware arovax
86 2006 antispyware win
85 webroot spy sweeper antispyware
83 antispyware free mcafee
81 window antispyware download
80 yahoo antispyware download
80 antispyware ewido
70 antispyware arovax aware
66 antispyware program
66 antispyware security software spyware window
65 spyware microsoft antispyware
61 1.10 antispyware ashampoo patch
61 2005 antispyware edition internet norton security
61 window antispyware beta
58 antispyware software free download
57 antispyware beta 1
56 microsoft antispyware beta download free
56 antispyware free program software
55 anti virus antispyware
55 antispyware avg serial
55 antispyware free ware
55 antispyware serial super
52 antispyware appliance
52 free microsoft antispyware beta
51 free yahoo antispyware
49 best free antispyware
49 free window antispyware
47 giant antispyware download
46 mcafee antispyware download
46 free antispyware tool
46 antispyware top
45 free anti virus antispyware
45 antispyware gratuit
44 free antispyware removal
41 window 98 antispyware
41 antispyware beta free download
41 antispyware edition internet norton security
40 microsoft antispyware update
Step 2 - go to the Google paste any of results above and get a lot of links where you can find different tips of software.

Wednesday, February 07, 2007

About previous post

Article in my previous post is very old, but advices in the article are very useful today.

Protecting Your Windows Computer with free resources

These days, running a computer that's connected to the internet is more likely to end in tears than doing splits naked over a live lobster, especially if you've got broadband. Worms, Trojans, Viruses, script kiddies – there's loads of dangers that can inconvenience you, or even worse – wreck your computer and damage your livelihood. And it's not just protecting your computer from attacks; there's also the problem of protecting your privacy from spy-ware etc.
This free article looks at free programs which help protect against pop-up windows, spyware, tracking cookies, viruses, unauthorised connections to the web and external intrusion attempts.
What are the most vulnerable parts of your system?
The bits that interface with the net are all vulnerable, whether that's an email client, a browser and, of course, anything that you download and install. And most of the vulnerable programs are Microsoft. I'm not going to get all political here; I've no idea if Microsoft products are more secure than others, but it is a fact that targeting IE or Outlook Express is a far more attractive proposition for a virus-writer than any other email clients, simply because so many more people use them – so a virus-writer gets to cause more damage. By advocating a non-Microsoft alternative to a product, I'm not knocking Microsoft, just playing the numbers. So please don't email me and complain that I'm bashing Microsoft!

Protecting Your Web Browser.

If you are only interested in designing for IE, then that's presumably the only browser you want on your system – but I bet you've got other browsers that you've installed for testing. Personally, I test in IE but surf the web more and more using Mozilla, because it's got fewer people targeting any weaknesses with exploits. There's a beta version of the newest Mozilla available, called Firefox. (Another fast text-and-tables only browser is Off By One, which leaves no cache on the hard-disc at all and is a standalone 1 meg download!).
To protect I.E., I make sure that no scripts or Active-X nasties can be dumped on me by disabling Active X downloads or setting IE to prompt me via the options in Tools > Internet options > Security > Custom Level. Because I thoroughly dislike pop-ups that I haven't asked for, I disable pop-ups using the Google toolbar. Some sites are coded to have an endless stream of pop-ups that will eventually cause your browser to crash and burn, and this can be avoided by toggling the option on the Google toolbar.

The Google toolbar blocks pop-ups.

When the toolbar blocks a pop-up, the cursor changes momentarily. Toggling the button above will allow pop-ups on the site temporarily.
Internet Explorer, being a Microsoft product, also integrates with ActiveX which can allow unwanted programs to be downloaded, even if you don't request them. There's been scary stories about e-card emails which download nasties when you click to go to the site receive your card: "It includes a hidden textarea which contains ActiveX to download a.exe, and overwrite the Windows Media Player wmplayer.exe with it … ". The downloaded exe then records your keystrokes when you're using some popular legitimate internet banking software, and phones your username, password and account details back to the hacker's computer. Yikes!
My advice is to adjust the security settings to the highest possible level – or to use Mozilla for sites you don't trust totally.

Firewall.

A firewall is essential. Suppose, for example, that you'd been had by the e-card stunt and a program was secretly running on your computer, collecting your credit card details and banking passwords. With a decent firewall, you'll be alerted when the malicious secret executable tries to contact with the net – and you'll get a chance to stop it!

Using your Firewall to monitor program's attempts to connect.

A firewall simply sits between your applications and the net. The one I use, and thoroughly recommend, is ZoneAlarm. It's a free download (click "Download FREE ZoneAlarm") from Zonelabs. I won't go into great detail about how it works here, as there are tutorials on the site, but you 'train' it to allow programs you trust to connect to the net. For the first few days, it'll pop up and say "Do you want to allow internet Explorer to contact the net?" –you click "yes" (and optionally, "remember this answer"). Subsequently, it won't ask you for that program. So if one day, it seemingly randomly asks you if you want to allow a program you've not heard of to contact the net, even when you're not trying to connect with any legitimate application, you can just click "no". Note that this doesn't clean this program from your system – but it does stop your banking details being sent to someone in the ex-soviet union.
Of course, the golden rule of computing that garbage in = garbage out applies; if you don't think carefully about which programs you permit to connect, you could inadvertently be telling ZoneAlarm to allow some horrible Trojan to connect. Consider the connection requests carefully; explorer.exe, winword.exe, outlook.exe etc are all pretty self-explanatory, but some program names aren't easy to work out – so, if in doubt say "no" to connection but don't tell ZoneAlarm to remember the answer; if some favourite program then hangs or doesn't do what you want it to do, you can be sure that the funny-named program belongs to a legitimate application, restart it and then say "yes" to ZoneAlarm and tell it to remember this in the future.

Using a Firewall to monitor outside attempts to break in.

The firewall also monitors intrusion attempts. When you're connected to the net, you're not just connected to the web. Malicious people and programs (like many of the worms that were spreading a few months ago) continually poll for machines connected to the web which aren't protected, and can introduce all kinds of nasties. ZoneAlarm will pop up an informational message telling you every time someone attempts to intrude through your connection – although fortunately, it is for information only; it's already denied access. (You can turn those messages off if they're interrupting you too frequently).
ZoneAlarm shows you that it successfully blocked an intrusion attempt
At the height of the blaster worm, I left my broadband connection on for an hour at lunchtime with no open browsers on my machine and when I came back from my lunch, ZoneAlarm reported 293 attempts to hack into my system! If only one of those were successful, I could've found myself in possession of a machine which was performing a denial of service attack on someone else, sending out spam, or hosting pornography.
It's best to have a firewall whenever you connect to the web; it's essential with broadband, where people tend to have an open connection for as long as the machine is on – and, of course, malicious code can be downloaded very fast without the machine noticeably slowing down and arousing your suspicions.

Spyware removal.
What is "Spyware"?

Spyware is a generic term for programs which you've chosen to install but which have an unwanted facility to "phone home" with information about what you use the program for. There's various sub-types; hijackers change your default search page-not-found page, Trojans allow other programs in that can do malign things like use your computer as a spam relay, and the infamous dialers hijack your modem so that looking at certain sites (often porn or casino sites) goes through their own premium rate phone lines. Even nastier than this are dialers that use a premium phone line (sometimes up to $5/ minute) for *all* web access! What these programs all have in common is that you choose to install them.
The least malignant of these is often known by the loaded term "adware". They're not always bad; for example, the Google toolbar can contact Google and tell it where you've been surfing – not identifying you by name, but giving aggregate data to help them improve their ranking software. Many users don't mind this. With other applications, however, the fact that the software will phone home is buried deep within the terms and conditions and is actually the only reason for the manufacturers to make the software, as they can sell the information they collect to marketing firms, or else tailor search results to go to sites that they control and make percentage on.
The list of spyware applications is enormous; most "fun" apps that plug into your email client or browser to give you animated gifs, smileys, groovy cursors are actually phoning home about where you visit when you surf the web. For example, the Hotbar software's terms and conditions states:
"HOTBAR COLLECTS AND STORES INFORMATION ABOUT THE WEB PAGES YOU VIEW AND THE DATA YOU ENTER IN SEARCH ENGINE SEARCH FIELDS WHILE USING THE SOFTWARE. HOTBAR USES THIS INFORMATION TO DETERMINE WHICH ADS AND BUTTONS TO DISPLAY ON YOUR HOTBAR TOOLBARS AND WHICH ADS TO SHOW YOUR BROWSER." - http://www.hotbar.com/
Other such applications are found in the Kazaa peer-to-peer file "sharing" client, (but not Kazaa Lite). The applications mentioned above (and many other adware applications) are perfectly legal; you choose to install them, you accept the terms and conditions, so it's all above board. Some are less benign; some hijack your browser's "web site cannot connect" message or search engine; these are always confined to Internet Explorer, as that's the dominant browser.
Getting rid of installed Spyware is not always easy. My two favourite programs are AdAware from LavaSoft and Spybot search and destroy (there's more, but I haven't tried them). Each of my recommended applications find spyware that the other doesn't (I guess because of their update cycles). Both of these free programs, when run, scan through your system and registry looking for spyware, dialers etc and report at the end, allowing you to delete them, much like commercial anti-virus programs. In addition to spyware, they will detect marketing cookies (more of these later).
NB: AdAware makes a noise when it finishes its scan. It makes me jump out of my skin every time, if I forget to turn the computer sound down!

Virus Scanning.

No matter how hard you try, viruses can sneak into your system. Commercial virus-scanners like Norton Anti-Virus will scan every email coming in, going out, and also do a full system search on command or at scheduled intervals, and delete viruses. Personally, I recommend paying the money for a commercial app; it might cost a few dollars, but your professional reputation is worth a lot – and is easily damaged if you start inadvertently sending viruses to clients, and the hours spent cleaning up a compromised system will not be billable to any client!
A freeware anti-virus program that I haven't tried but have heard good reports of is AVG anti-virus which is free to individual home users, with no technical support and without scheduling of tasks, e.g. you have to remember to set it to scan manually. It includes:
AVG Resident Protection
AVG e-mail Scanner
AVG On-Demand Scanner
Basic Scheduled Tests
Free Virus Database Updates
Automatic Update feature
Easy-To-Use Interface
Automatic Healing of infected files
AVG Virus Vault for safe handling of infected files
Any virus scanner is only as good as the virus definitions. Especially if you're on dial-up, you must download the latest definitions; otherwise it won't catch any nasties newer than the last definition file you downloaded!

Privacy Protection.

Cookies are a very useful tool in the web developer's trade. At DMXzone, we use them in order to recognise you when you login and to store information on our server about which extensions and premium tutorials you own in order than you can download updates or code whenever you want. Amazon uses cookies to recognise you for their incredibly powerful personalisation suite. (A great article on how to set cookies can be found here).
Some cookies can be used by marketers for example – these are called "tracking cookies" or "data miners". Ah! You might say, cookies can only be read by the domain that served them, so they can't track me across the web. Yes and no, I reply. Many sites serve adverts from 3rd party sites, which set a cookie (fastclick.com and doubleclick.com are common, and there's others for adult sites). When you go to another site, that uses the same advertising server, it can read the cookies set before and build up a profile of where you go. Doubleclick advertisers can figure out who you are as long as you have ever bought anything online or filled out a form from one of their client sites, which is potentially a privacy invasion.
So for example, you go to www.widget.com which serves an ad from www.snoop-ad.com which sets a cookie. When you later go to www.thingie.com, if it also serves an ad from www.snoop-ad.com, the advertising company knows that you went to both sites, and could report that back to the site owners. Maybe you don't mind; maybe, like me, you don't want people tracking your surfing and purchases.
You can opt-out of doubleclick's cookies here, or spyware scanners will pick them up. Alternatively, just be sure periodically to clear the cookies stored in your browser.

Summary.

It's a hard business keeping your computer safe, secure and happy on the wild west of the web. But you can increase your chances of being nasties-free, without harming your wallet, using the programs I've detailed above. Bear in mind, these are free programs and may not continue to be updated and developed by their creators – or may indeed cease to be free. Good luck, and stay computer-healthy!

Monday, February 05, 2007

eBay Phishes: a Red-Herring for eBay Hijackings?

Vulnerabilities in eBay site may be to blameBy now, we're all used to seeing those fake emails that claim your eBay account was hijacked, or claim listings for items you know aren't really on your account. The goal of these email, called phishes, is to get you to follow the link provided in the email and enter your login credentials on a spoofed eBay look-alike site, after which the credentials are logged for later use by the attackers.But these prolific phish may be a red-herring, diverting attention from the very real problem of legitimate, non-phished eBay hijackings.Even worse, these hijackings may be a result of security vulnerabilities in eBay and PayPal's own websites.The scam works like this:A fraudulent seller obtains access to a trusted eBay account and posts items for sale under the hijacked account.The auction either instructs the buyer to submit payment to a specific account (not the one tied to the eBay account) or, after the auction is complete, the fraudulent seller instructs the buyer to send funds to a different account.The buyer submits the payment, the fraudulent seller takes off with the money and never sends the seller the purchased item.The duped seller then reports the matter to eBay and the legitimate account holder is held liable. Sometimes these scams even result in the legitimate user being suspended from use of their eBay account for up to a year.Such hijackings allow an unscrupulous person to exploit others by taking advantage of the good reputation of a legitimate eBay auctioneer Read more

Thursday, February 01, 2007

Answers to frequently asked questions about antivirus software

1. What is the best antivirus to use? The best antivirus software is the one that works best on your system, has the features you want, and is easy for you to use. Because every system is unique, if you're shopping for new antivirus software, you should evaluate several products to find the one best suited for your PC and your level of experience. Of course, you'll want to stick with only qualified, reputable antivirus products that have received certification from the three major certification authorities: Checkmark, ICSALabs, and VB100% - and which have performed well on the rigorous tests conducted by AV-Test.org. Each of these meets this criteria.

2. Do we need to have both an antivirus and an anti-spyware scanner? It depends. Some antivirus products, notably McAfee VirusScan, include stellar spyware protection - but many others do not. If you are experiencing ongoing problems with spyware, you might want to consider adding a dedicated spyware scanner to the mix. For recommendations, check out these Top Spyware Scanners.

3. Do we have to uninstall the existing antivirus program before installing a new one? If you are changing to a new antivirus product, you will need to uninstall the previous antivirus scanner first. After uninstalling, you must reboot your PC before installing the new scanner. If you are simply upgrading the existing antivirus software to a newer version of the same product, there is no need to uninstall the older version first. However, if the new version is two or more versions newer than the old, then you will want to uninstall the old version before installing the new. Again, anytime you uninstall an existing antivirus product, be sure to reboot the computer before installing the new scanner.

4. Can two antivirus scanners be run on the same system at the same time. It is never a good idea to run two antivirus scanners simultaneously. However, if only one of the scanners has real-time protection enabled and the second scanner is used only to manually scan selected files, they may possible co-exist peacefully. In some cases, an antivirus scanner will not install if it detects another antivirus scanner already installed on the system.

Windows Vista Antivirus

Windows Vista is now on retail shelves. Here's a quick rundown of consumer antivirus software currently certified for compatibility with the new Vista operating system. Unless otherwise noted, the list pertains to the most current versions of the product only.
Certified for Windows Vista
· CA Anti-Virus 2007
· Kaspersky Internet Security 6.0.2.614
· Kaspersky Anti-Virus 6.0.2.614
· McAfee Total Protection 2007
· McAfee Internet Security Suite 2007
· McAfee PC Protection Plus 2007
· McAfee VirusScan 2007
· McAfee Wireless Protection 2007
· McAfee SiteAdvisor
· McAfee SiteAdvisor Plus
· Norton Internet Security 2006/2007
· Norton AntiVirus 2006/2007
· Norton Confidential (on or after February 4, 2007)
· Panda Antivirus 2007
· Panda Internet Security 2007
· Trend Micro Internet Security 2007
· Trend Micro AntiVirus plus AntiSpyware 2007 Note: Antivirus products from Grisoft (AVG) and Eset (NOD32) are expected to receive certification soon.