Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Cannot get rid of Iminent

  • Please log in to reply
9 replies to this topic

#1 Didi1163


  • Members
  • 6 posts
  • Local time:04:11 AM

Posted 19 February 2013 - 07:35 PM

I seem to have somehow gotten the Search Iminent hijacker on my computer.  I tried to uninstall it using Revo - but it did not take it completely off my system.  I tried a system restore.  Still no luck.  Malaware bytes.  You name it.  I deleted Firefox, changed the settings in Google and Internet Explorer to get rid of the tool bars.  While googling a solution, I happened upon someone who had the same problem on your site. (creative gd)  I followed what it said up to the Junkware removal tool - whenever I clicked on it,my computer said the file was malicious.  I thought it was completely gone.  Not quite.  If I am search for something while on chrome, if I hit new tab and do not type in google first, it brings up the search iminent tool bar.  I just wanted to get rid of this on my computer.  Any help is much appreciated.


I am using Windows 7 

on HP p6710F



BC AdBot (Login to Remove)


#2 narenxp


  • BC Advisor
  • 16,371 posts
  • Gender:Male
  • Location:India
  • Local time:04:11 AM

Posted 19 February 2013 - 07:59 PM

  • Please download TDSSKiller from here and save it to your Desktop
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters

  • Check Loaded Modules  and Detect TDLFS file systemDo not check Verify file digital signatures (even though it is checked in the example)
  • If you are asked to reboot because an "Extended Monitoring Driver is required" please click Reboot now

  • Click Start Scan and allow the scan process to run

  • If threats are detected select Skip for all of them unless I instruct you otherwise
  • Click Continue

  • Click Reboot computer
  • Please post the contents of  TDSSKiller.[Version]_[Date]_[Time]_log.txt found in your root directory (typically c:\)in your reply




  • Download aswMBR and save it to your desktop.
  • Please disable your real time protection of any Antivirus, Antispyware or Antimalware programs temporarily. They will interfere and may cause unexpected results.
  • If you need help to disable your protection programs see here and here.
  • Double click the aswMBR.exe file to run it. Please allow when you are asked to download AVAST antivirus engine defs.
  • Wait until the AV update is done, then click on the Scan button to start. The program will launch a scan.

  • When done, you will see Scan finished successfully. Please click on Save log and save the file to your desktop.

  • Please post the contents of the log in your next reply.

NOTE:  aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.


ESET Online Scanner


I'd like us to scan your machine with ESET OnlineScan  This process may may take several hours, that is normal

  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the   button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)

    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the icon on your desktop.

  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:

    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Copy and paste the information in your next reply.   Note:  If no malware was found you will not get a log.
  • Click the Back button.
  • Click the Finish button.


Things I would like to see in your next reply. Please be sure to copy and paste the information rather than send an attachment. :thumbsup2:

  • TDSSKiller log
  • aswMBR log
  • ESET results


#3 Didi1163

  • Topic Starter

  • Members
  • 6 posts
  • Local time:04:11 AM

Posted 21 February 2013 - 08:13 AM

Thank you for your help.  For some reason, I am not able to copy and paste the log from the TDSSKiller.exe but it told me there were not threats.  
The aswMBR log:
aswMBR version Copyright© 2011 AVAST Software
Run date: 2013-02-20 20:01:46
20:01:46.272    OS Version: Windows x64 6.1.7601 Service Pack 1
20:01:46.272    Number of processors: 4 586 0xA00
20:01:46.273    ComputerName: DONNAS-HP052811  UserName: Donna
20:01:51.540    Initialize success
20:03:57.299    AVAST engine defs: 13022001
20:04:11.495    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\00000064
20:04:11.511    Disk 0 Vendor: Hitachi_ JP4O Size: 953869MB BusType: 11
20:04:11.526    Disk 0 MBR read successfully
20:04:11.526    Disk 0 MBR scan
20:04:11.542    Disk 0 unknown MBR code
20:04:11.542    Disk 0 Partition 1 80 (A) 07    HPFS/NTFS NTFS          100 MB offset 2048
20:04:11.558    Disk 0 Partition 2 00     07    HPFS/NTFS NTFS       940545 MB offset 206848
20:04:11.589    Disk 0 Partition 3 00     07    HPFS/NTFS NTFS        13222 MB offset 1926443008
20:04:11.636    Disk 0 scanning C:\Windows\system32\drivers
20:04:21.042    Service scanning
20:04:45.394    Modules scanning
20:04:45.410    Disk 0 trace - called modules:
20:04:45.410    ntoskrnl.exe CLASSPNP.SYS disk.sys amd_xata.sys storport.sys hal.dll amd_sata.sys 
20:04:45.425    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xfffffa80046e5790]
20:04:45.441    3 CLASSPNP.SYS[fffff88001b0443f] -> nt!IofCallDriver -> [0xfffffa80041d4ac0]
20:04:45.441    5 amd_xata.sys[fffff880011b48b4] -> nt!IofCallDriver -> \Device\00000064[0xfffffa80041cd9c0]
20:04:47.796    AVAST engine scan C:\Windows
20:04:51.650    AVAST engine scan C:\Windows\system32
20:07:37.244    AVAST engine scan C:\Windows\system32\drivers
20:07:59.911    AVAST engine scan C:\Users\Donna
20:10:19.094    AVAST engine scan C:\ProgramData
20:11:08.671    Scan finished successfully
20:11:20.480    Disk 0 MBR has been saved successfully to "C:\Users\Donna\Downloads\MBR.dat"
20:11:20.480    The log file has been saved successfully to "C:\Users\Donna\Downloads\aswMBR.txt"
The ESET will not let me cut and paste either but there were the four threats listed:
They are in Manage Quarantine.
I did notice this morning that I did not get the search iminent task bar.  
Thanks for all your help, it is much appreciated 

#4 narenxp


  • BC Advisor
  • 16,371 posts
  • Gender:Male
  • Location:India
  • Local time:04:11 AM

Posted 21 February 2013 - 08:32 AM



Please download Malwarebytes Anti-Malware and save it to your desktop.  If you already have it installed launch the program and update the database.

  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.  You can also right click on the link and select Save Link As

Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on the renamed file to install the application.
    For instructions with screenshots, please refer to this Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings except to uncheck any offer for a free Pro trial version
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.

Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.


Farbar's MiniToolBox


  • Please download MiniToolBox, save it to your desktop
  • Please close any Firefox browsers you may have open
  • Double click the icon to launch the program
  • Make sure the following options are checked:

    • Flush DNS
    • Report IE Proxy Settings
    • Reset IE Proxy Settings
    • Report FF Proxy Settings
    • Reset FF Proxy Settings
    • List content of Hosts
    • List IP configuration
    • List Winsock Entries
    • List last 10 Event Viewer log
    • List Installed Programs
    • List Devices
    • List Users, Partitions and Memory size.
  • Click Go and once the scan is completed a Result.txt Notepad document will open on your desktop
  • Please copy and paste the contents in your reply


Farbar's Service Scanner


Please download Farbar Service Scanner, save it to your desktop, and run it.

  • Make sure the following options are checked:

    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center/Action Center
    • Windows Update
    • Windows Defender
    • Other Services
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.


AdwCleaner by Xplode - Search for Adware


  • Please download AdwCleaner by Xplode onto your desktop.
  • Double click on AdwCleaner.exe, select OK, then Run
  • Click on DELETE
  • A logfile will automatically open after the scan has finished
  • Copy and paste the contents in your reply
  • You can find the logfile at C:\AdwCleaner[R1].txt as well


Junkware Removal Tooll by thisisu


  • Please download Junkware Removal Tool and save it to your desktop.
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Right-mouse click JRT.exe and select Run as administrator (Windows XP double click the icon)
  • Please allow the program time to run
  • Once completed a Notepad document will open on your desktop
  • Copy and paste the contents in your reply




Please download Rkill by Grinler from one of the 4 links below (if one of them does not work try another...) and save it to your desktop:

  • In order for Rkill to run properly you must disable your anti-malware software.  Please refer to this page if you are not sure how.
  • Double-click on Rkill. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
    • Note:  You may have to run Rkill a few times before it is successful.  You may also have to download Rkill from a different link which will save it as a different file name.
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • An Rkill.log will appear.  Please copy and paste the contents in your reply (file also located at c:\rkill.log)
  • Do not reboot your computer after running Rkill as the malware programs will start again.  If your computer reboots, run Rkill again before continuing on to the next step.
  • If nothing happens or if the tool does not run, please let me know in your next reply.




  • Please download AutoRuns and save it to your desktop
  • Double click the AutoRuns.zip folder
  • Double click autoruns.exe (not autorunsc.exe), select Run, then Run again and allow the information to populate
  • Select File, Save, Desktop (in the left hand pane), then Save filename as Autoruns.txt and change Save as type to  Text(*.txt).
  • Double click on the text file,copy and paste the contents in your reply


Things I would like to see in your next reply. Please be sure to copy and paste the information rather than send an attachment. :thumbsup2:

  • Malwarebytes log
  • MiniToolBox log
  • Farbar's Service Scanner log
  • AdwCleaner log
  • Junkware Removal Tool log
  • Rkill log
  • Autoruns log


#5 Didi1163

  • Topic Starter

  • Members
  • 6 posts
  • Local time:04:11 AM

Posted 21 February 2013 - 08:06 PM

Malwarebytes Anti-Malware (PRO)
Database version: v2013.02.21.11
Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Donna :: DONNAS-HP052811 [administrator]
Protection: Enabled
2/21/2013 7:41:57 PM
mbam-log-2013-02-21 (19-41-57).txt
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 200033
Time elapsed: 2 minute(s), 35 second(s)
Memory Processes Detected: 0
(No malicious items detected)
Memory Modules Detected: 0
(No malicious items detected)
Registry Keys Detected: 0
(No malicious items detected)
Registry Values Detected: 0
(No malicious items detected)
Registry Data Items Detected: 0
(No malicious items detected)
Folders Detected: 0
(No malicious items detected)
Files Detected: 0
(No malicious items detected)MiniToolBox by Farbar  Version:10-01-2013
Ran by Donna (administrator) on 21-02-2013 at 19:46:37
Running from "C:\Users\Donna\Downloads"
Windows 7 Home Premium Service Pack 1 (X64)
Boot Mode: Normal
========================= Flush DNS: ===================================
Windows IP Configuration
Successfully flushed the DNS Resolver Cache.
========================= IE Proxy Settings: ============================== 
Proxy is not enabled.
No Proxy Server is set.
"Reset IE Proxy Settings": IE Proxy Settings were reset.
========================= Hosts content: =================================
========================= IP Configuration: ================================
802.11n Wireless LAN Card = Wireless Network Connection 2 (Connected)
Realtek PCIe FE Family Controller = Local Area Connection (Media disconnected)
Microsoft Virtual WiFi Miniport Adapter = Wireless Network Connection 3 (Media disconnected)
# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4
set global icmpredirects=enabled
# End of IPv4 configuration
Farbar Service Scanner Version: 20-02-2013
Ran by Donna (administrator) on 21-02-2013 at 19:50:19
Running from "C:\Users\Donna\Downloads"
Windows 7 Home Premium Service Pack 1 (X64)
Boot Mode: Normal
Internet Services:
Connection Status:
Localhost is accessible.
LAN connected.
Google IP is accessible.
Google.com is accessible.
Yahoo IP is accessible.
Yahoo.com is accessible.
Windows Firewall:
Firewall Disabled Policy: 
System Restore:
System Restore Disabled Policy: 
Action Center:
Windows Update:
Windows Autoupdate Disabled Policy: 
Windows Defender:
WinDefend Service is not running. Checking service configuration:
The start type of WinDefend service is set to Demand. The default start type is Auto.
The ImagePath of WinDefend service is OK.
The ServiceDll of WinDefend service is OK.
Windows Defender Disabled Policy: 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender]
Other Services:
File Check:
C:\Windows\System32\nsisvc.dll => MD5 is legit
C:\Windows\System32\drivers\nsiproxy.sys => MD5 is legit
C:\Windows\System32\dhcpcore.dll => MD5 is legit
C:\Windows\System32\drivers\afd.sys => MD5 is legit
C:\Windows\System32\drivers\tdx.sys => MD5 is legit
C:\Windows\System32\Drivers\tcpip.sys => MD5 is legit
C:\Windows\System32\dnsrslvr.dll => MD5 is legit
C:\Windows\System32\mpssvc.dll => MD5 is legit
C:\Windows\System32\bfe.dll => MD5 is legit
C:\Windows\System32\drivers\mpsdrv.sys => MD5 is legit
C:\Windows\System32\SDRSVC.dll => MD5 is legit
C:\Windows\System32\vssvc.exe => MD5 is legit
C:\Windows\System32\wscsvc.dll => MD5 is legit
C:\Windows\System32\wbem\WMIsvc.dll => MD5 is legit
C:\Windows\System32\wuaueng.dll => MD5 is legit
C:\Windows\System32\qmgr.dll => MD5 is legit
C:\Windows\System32\es.dll => MD5 is legit
C:\Windows\System32\cryptsvc.dll => MD5 is legit
C:\Program Files\Windows Defender\MpSvc.dll => MD5 is legit
C:\Windows\System32\ipnathlp.dll => MD5 is legit
C:\Windows\System32\iphlpsvc.dll => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\System32\rpcss.dll => MD5 is legit
**** End of log ****

#6 Didi1163

  • Topic Starter

  • Members
  • 6 posts
  • Local time:04:11 AM

Posted 21 February 2013 - 08:08 PM

# AdwCleaner v2.112 - Logfile created 02/21/2013 at 20:07:46
# Updated 10/02/2013 by Xplode
# Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)
# User : Donna - DONNAS-HP052811
# Boot Mode : Normal
# Running from : C:\Users\Donna\Downloads\AdwCleaner (2).exe
# Option [Search]
***** [Services] *****
***** [Files / Folders] *****
***** [Registry] *****
***** [Internet Browsers] *****
-\\ Internet Explorer v9.0.8112.16464
[OK] Registry is clean.
-\\ Google Chrome v24.0.1312.57
File : C:\Users\Donna\AppData\Local\Google\Chrome\User Data\Default\Preferences
[OK] File is clean.
AdwCleaner[R1].txt - [8543 octets] - [21/02/2013 19:54:19]
AdwCleaner[R2].txt - [729 octets] - [21/02/2013 20:07:46]
AdwCleaner[S1].txt - [8530 octets] - [02/02/2013 13:56:26]
AdwCleaner[S2].txt - [856 octets] - [03/02/2013 16:45:37]
AdwCleaner[S3].txt - [8918 octets] - [21/02/2013 19:54:53]
########## EOF - C:\AdwCleaner[R2].txt - [967 octets] ##########

#7 Didi1163

  • Topic Starter

  • Members
  • 6 posts
  • Local time:04:11 AM

Posted 21 February 2013 - 08:33 PM

Junkware Removal Tool (JRT) by Thisisu
Version: 4.6.5 (02.18.2013:1)
OS: Windows 7 Home Premium x64
Ran by Donna on Thu 02/21/2013 at 20:14:37.00
~~~ Services
~~~ Registry Values
Successfully deleted: [Registry Value] hkey_local_machine\software\microsoft\internet explorer\toolbar\\{ba00b7b1-0351-477a-b948-23e3ee5a73d4} 
~~~ Registry Keys
Successfully deleted: [Registry Key] hkey_current_user\software\aol toolbar
Successfully deleted: [Registry Key] hkey_local_machine\software\aol toolbar
Successfully deleted: [Registry Key] hkey_local_machine\software\classes\installer\upgradecodes\f928123a039649549966d4c29d35b1c9
Successfully deleted: [Registry Key] hkey_classes_root\clsid\{3ef64538-8b54-4573-b48f-4d34b0238ab2}
Successfully deleted: [Registry Key] hkey_local_machine\software\microsoft\windows\currentversion\explorer\browser helper objects\{3ef64538-8b54-4573-b48f-4d34b0238ab2}
Successfully deleted: [Registry Key] hkey_classes_root\clsid\{ba00b7b1-0351-477a-b948-23e3ee5a73d4}
Successfully deleted: [Registry Key] hkey_classes_root\clsid\{f0e98552-8e47-4c6c-9b3a-11ab0549f94d}
Successfully deleted: [Registry Key] hkey_current_user\software\microsoft\internet explorer\searchscopes\{b7fca997-d0fb-4fe0-8afd-255e89cf9671} 
Successfully deleted: [Registry Key] hkey_local_machine\software\microsoft\internet explorer\searchscopes\{b7fca997-d0fb-4fe0-8afd-255e89cf9671} 
~~~ Files
Successfully deleted: [File] C:\eula.1028.txt
Successfully deleted: [File] C:\eula.1031.txt
Successfully deleted: [File] C:\eula.1033.txt
Successfully deleted: [File] C:\eula.1036.txt
Successfully deleted: [File] C:\eula.1040.txt
Successfully deleted: [File] C:\eula.1041.txt
Successfully deleted: [File] C:\eula.1042.txt
Successfully deleted: [File] C:\eula.2052.txt
Successfully deleted: [File] C:\install.res.1028.dll
Successfully deleted: [File] C:\install.res.1031.dll
Successfully deleted: [File] C:\install.res.1033.dll
Successfully deleted: [File] C:\install.res.1036.dll
Successfully deleted: [File] C:\install.res.1040.dll
Successfully deleted: [File] C:\install.res.1041.dll
Successfully deleted: [File] C:\install.res.1042.dll
Successfully deleted: [File] C:\install.res.2052.dll
Successfully deleted: [File] C:\install.res.3082.dll
~~~ Folders
Successfully deleted: [Folder] "C:\ProgramData\aol toolbar"
Successfully deleted: [Folder] "C:\Users\Donna\AppData\Roaming\registry mechanic"
Successfully deleted: [Folder] "C:\Users\Donna\AppData\Roaming\strongvault"
Successfully deleted: [Folder] "C:\Users\Donna\appdata\local\stronghold_llc"
Successfully deleted: [Folder] "C:\Program Files (x86)\aol toolbar"
Successfully deleted: [Folder] "C:\Program Files (x86)\coupons"
Successfully deleted: [Folder] "C:\Windows\syswow64\ai_recyclebin"
~~~ Event Viewer Logs were cleared
Scan was completed on Thu 02/21/2013 at 20:24:08.22
End of JRT log
Rkill 2.4.7 by Lawrence Abrams (Grinler)
Copyright 2008-2013 BleepingComputer.com
More Information about Rkill can be found at this link:
Program started at: 02/21/2013 08:26:16 PM in x64 mode.
Windows Version: Windows 7 Home Premium Service Pack 1
Checking for Windows services to stop:
 * No malware services found to stop.
Checking for processes to terminate:
 * No malware processes found to kill.
Checking Registry for malware related settings:
 * No issues found in the Registry.
Resetting .EXE, .COM, & .BAT associations in the Windows Registry.
Performing miscellaneous checks:
 * Windows Defender Disabled
   [HKLM\SOFTWARE\Microsoft\Windows Defender]
   "DisableAntiSpyware" = dword:00000001
Checking Windows Service Integrity: 
 * Windows Defender (WinDefend) is not Running.
   Startup Type set to: Manual
Searching for Missing Digital Signatures: 
 * No issues found.
Checking HOSTS File: 
 * No issues found.
Program finished at: 02/21/2013 08:26:27 PM
For some reason, I cannot open up the Autoruns - I downloaded it but am not able to open it like you asked
Thanks again

#8 narenxp


  • BC Advisor
  • 16,371 posts
  • Gender:Male
  • Location:India
  • Local time:04:11 AM

Posted 21 February 2013 - 09:38 PM

Current issues?

#9 Didi1163

  • Topic Starter

  • Members
  • 6 posts
  • Local time:04:11 AM

Posted 22 February 2013 - 06:46 AM

It seems to be running much better. I do not get the iminent search browser any more.  Computer running much faster.  Thank you very much for all your help.  I really really appreciate it!

#10 narenxp


  • BC Advisor
  • 16,371 posts
  • Gender:Male
  • Location:India
  • Local time:04:11 AM

Posted 22 February 2013 - 06:50 AM

That looks good

Remove temporary and junk files



Launch it,it will close all running programs

click on START,it should ask for reboot.If TFC locks up the system,run it in safemode

Create a new restore point

Follow this guide to turn off and turn on your restore points

XP- http://support.microsoft.com/kb/310405

Vista & windows 7- http://windows.microsoft.com/en-US/windows7/Turn-System-Restore-on-or-off

Turn off your system restore-It deletes old infected restore points

Turn on system restore and create a new restore point

Update JAVA and Flash player

Uninstall old version of java from control panel-Add or remove programs.Download the latest version from here


Update your flash player

Antivirus recommendations

Update your antivirus frequently.Two free antivirus that i would suggest are

Microsoft security essentials or Avast.You can select either one of them.

If you have a paid one,make sure to update it frequently.Do not use multiple security softwares.

Informative guides that could prevent you from being infected again

How did I get infected?


Best Practices for Safe Computing - Prevention of Malware Infection


Simple and easy ways to keep your computer safe and secure on the Internet


Safe surfing :)


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users