There are 35 Security tutorials. Show
Category: Security | Read 55,855 times | Last Modified on June 05, 2012
HijackThis sollte nur benutzt werden wenn Ihr Browser oder Computer immer noch Probleme aufweist, nach dem Sie Spybot oder andere Spyware/Hijack entferner laufen hatten. HijackThis ist ein Programm für Fortgeschrittene und benötigt daher ein erweitertes Wissen über Windows und Operations Systeme im generellen. Wenn Sie aufgelistete Elemente löschen, ohne zu wissen was Sie sind, können andere Probleme wie nicht funktionierender Internetzugang, oder ein nicht mehr arbeitendendes Operations System die folge sein. Daher sollten Sie jegliche andere Möglichkeiten ausprobieren bevor Sie HijackThis nutzen. Sollten Sie HijackThis erlauben Elemente zu entfernen bevor ein anderes Programm Ihr System überprüft hat, werden die Dateien der Hijacker/Spyware immer noch auf Ihrem Computer verbleiben und zukünftige Entfernungstools werden nicht mehr in der Lage sein, sie zu finden.
Category: Security, Windows 7, Windows 8, Windows Vista, Windows XP | Read 134,717 times | Last Modified on December 13, 2012
Within this document I am talking about changing the contents of the Registry. Always be sure to make a backup before changing. You can do this in the Registry Editor by clicking File, Export and following the prompts.
Category: Security | Read 3,599,777 times | Last Modified on February 27, 2012
If you use a computer, read the newspaper, or watch the news, you will know about computer viruses or other malware. These are those malicious programs that once they infect your machine will start causing havoc on your computer. What many people do not know is that there are many different types of infections that are categorized in the general category of Malware.
Category: Security | Read 231,238 times | Last Modified on February 22, 2013
Have you ever been connected to your computer when something strange happens? A CD drive opens on its own, your mouse moves by itself, programs close without any errors, or your printer starts printing out of nowhere? When this happens, one of the first thoughts that may pop into your head is that someone has hacked your computer and is playing around with you. Then you start feeling anger tinged with a bit of fear, because someone is violating your personal space without your permission and potentially accessing your private data. At these times instead of panicking, this tutorial will show what to do and how to potentially help you track down the hacker and report them to the authorities.
CleanUp! is a freeware utility created by Steven Gould to protect your privacy. This tool has the ability clean your browser's history, bookmarks, favorites, cookies as well as other privacy related locations on your computer.
Category: Security | Read 51,756 times | Last Modified on September 10, 2012
It is exciting to get a new computer. Think of all the applications and games you can now run, the music you can store, and the pictures you can share with friends. Your new computer is delivered, you quickly unpack it, and start plugging it all in. The computer boots up, the desktop appears, and just by clicking on your web browser icon you are suddenly connected to the wide world of the Internet and all the enjoyment you can derive from it.
Category: Security | Read 269,288 times | Last Modified on February 27, 2012
There is a new CoolWebSearch browser hijacker infection that has become very common lately. Symptoms of this infection include your computer becoming slower, popups, and when you start Internet Explorer your web page gets redirected to a site that has a title of Home Search.
Category: Security | Read 22,200 times | Last Modified on February 27, 2012
GDI+ is a programming interface or API that enables programs to use graphics and formatted text on a video display or printer. A vulnerability, GDI+ JPEG Vulnerability, was found in the DLL gdiplus.dll used by GDI+ that has faulty code when processing JPEG images. People who know how this code can be exploited can craft a specially designed JPEG that can exploit this bug and possibly take control of your machine. If you view an image using an application that has this vulnerability, then it is possible for the remote program to issue commands on your computer at the same security level as your user account. Therefore if your user account is an administrator of your machine, then the remote code will have administrative privileges and be able to have full access to the security of your computer.
Category: Security, Windows 7, Windows 8, Windows Vista, Windows XP | Read 207,464 times | Last Modified on December 13, 2012
A common misconception when working on removing malware from a computer is that the only place an infection will start from is in one of the entries enumerated by HijackThis. For the most part these entries are the most common, but it is not always the case. Lately there are more infections installing a part of themselves as a service. Some examples are Ssearch.biz and Home Search Assistant.
Let's face it, the Internet is not a very safe place. There are hackers trying to access your computer, worms trying to infect you, malicious Trojans disguised as helpful programs, and spyware that reports your activities back to their makers. In many cases those who become infected unknowingly become a breeding ground for unwanted programs and criminal activity. It does not have to be this way. With proper education and smart computing the Internet can be a safe, useful, and fun place to visit without having to worry about what is lurking around the corner.
|Tech Support Forums | The Computer Glossary | RSS Feeds | Startups | The File Database | Virus Removal Guides | Downloads|