You are viewing our Forum Archives. To view or take place in current topics click here.
Everything you need to know about Computers Posted 7/17/12
Posted:

Everything you need to know about Computers Posted 7/17/12Posted:

Reminiscing
  • TTG Senior
Status: Offline
Joined: Mar 06, 201212Year Member
Posts: 1,011
Reputation Power: 61
Status: Offline
Joined: Mar 06, 201212Year Member
Posts: 1,011
Reputation Power: 61
Hello, today I will be helping you with the following:

  • Finding the correct protection for your computer
  • Determining what Os you have
  • Speeding up your computer
  • Maximizing your computers start up
  • How to remove a virus
  • How to remove a Rootkit/TDL Infection
  • Virus Definitions
  • How to Nuke your Browser after removal of threats
  • Helpful Command Lines
  • How to stay protected



Finding the correct protection for your computer.

Now choosing the correct protection for your computer can sometimes be hard and even expensive. I would like to make finding the right Internet Security easy. It all depends on what you do more. The question is if you are a heavy down loader and you feel that your current I.S. Is not doing a good job at fully blocking and protecting your Pc. Chances are your I.S. Is not right for you. There has yet to be a specific security suite that has all the perks needed to keep a Pc fully 100% protected. Every day there is thousands and thousands of new pieces of malware being created and even discovered. So staying protected is constantly a struggle. I have tested and written full reviews on some of the best known Internet Securities, each one varied from the other, some stood out, some failed under pressure.


Internet Securities of 2012


Avast Internet Security 7: is new and improved compared to previous version. Some new features from Avast are: Boot time scan, which is the safest way to remove a virus. It doesn't allow windows to start until everything is scanned. If a virus is found it is quarantined straight to sandbox. Sandbox is a viruses worst nightmare, once an infection is quarantined here, it will never be allowed to start again. As for the process; it is per-mentally terminated. Avast has a new Cloud scanner, which scans the codes, file paths, basically everything. Once you download something this automatically checks it to make sure nothing malicious gets run on your system.

Avast Interface:

[ Register or Signin to view external links. ]


AVG Internet Security 2012: Has one of the highest detection rates and is great for finding anything. It has Award winning Virus protection & Anti-spyware. It offers a Free 30 Day trail, in which gives you access to their Rootkit scanner. This can be used to detect some of the most harmful things; this is a great product and I highly recommend it. When you download AVG you have the option to choose a custom install of their default (Recommended) Install. AVG offers a toolbar which blocks out malicious websites as you surf the web. The toolbar is locked so if a virus get through it won't be able to alter AVG. If you are infected with a virus that AVG doesn't find when scanning you can visit their website and the will remove the virus through team viewer (Paid Version)

AVG 2012 Interface

[ Register or Signin to view external links. ]


Bitdefender Internet Security 2013 has been completely remodeled bringing the newest ways to fight and keep your computer safe at all times. It protects your computer without you having to do a thing (Hand free protection). Bitdefender has one of the best Anti-Phishing protections out there, along with privacy protection, and Identity theft protection. If Bitdefender can't remove a virus while the computer is running, it requires a reboot where it will stop windows from starting until the virus is removed. If a virus compromises the system, not allowing it to start you can enter Bitdefender Safe mode (Without a CD download) where Bitdefender will remove the virus. When you buy their product they offer free online services where you can chat with a technician or have a virus removed in Team Viewer. The best new feature that Bitdefender has introduced is Auto Pilot, Just as you were in an airplane, the pilot can step away without ever having to do a thing. If you get infected with a Virus while surfing the web this will remove it quarantine it, without you having to do anything.

Bitdefender Interface:

[ Register or Signin to view external links. ]


BullGuard Internet Security 12 has many new reluctant features which provide complete protection along with support. BullGuards malware detection and clean up on an infected system is very low at 71%. BullGuard isn't as good at removing malware as it is at blocking it. BullGuard scored 91% for keeping a clean system protected. When you purchase this suite you have access to 5GB of online storage space, where you can store crucial system files, protecting them from infections. If a viruses compromises the system from loading BullGuard isn't very good at getting the system back to working condition. It lacks key components in it's old out dated firewall, which makes it easy to exploit thus granting access to personal information along with critical information like (Credit cards, bank accounts, ect.). BullGuard Internet Security is good overall protection but, has a heavy effect on system performance.

BullGuard Interface

[ Register or Signin to view external links. ]


Comodo Internet Security Pro 2012 Is simply amazing. When you download their product you get 3 layers of protection: Prevention, Default Deny-Whitelist with over 15,000,000 files marked as safe, and sandboxing. Comodo's Sandboxing technique, Isolates potentially dangerous, unknown, and untrusted applications from your critical system resources and personal information. The Second layer of protection is: Their new Antivirus detection. The final layer is: Comodo's Geek Buddy Support which is live online support. If you become infected with a virus while under Comodo's protection they will pay up to $500 to restore your system to working condition. If there is a file that is unknown to Comodo's list of 15,000,000 that is asking for complete access to your critical system resources, Comodo treats it as potentially harmful. This then gets placed in a closely monitored, tightly controlled, isolated environment within their sandbox. Applications within the sandbox can run, but with very restricted access to your Pc's critical resources or information. When the Av team determines if the file is safe, it is automatically added to their whitelist, then released from the sandbox and given appropriate access to the requested files. If the file is determined as malware, it is instantly added to their list of unsafe files and deleted from your system. Comodo Internet Security has award winning fire wall protection, which pro-actively protects critical Pc files from damage by unknown and untrusted programs. Comodo's antivirus scans your Pc to detect and remove malware. This is one of the best products out there and I highly recommend it!

Comodo Interface:

[ Register or Signin to view external links. ]


Emsisoft Anti-Malware 2012 is elite at finding Rootkits, and mainly Corrupted Java program which have been altered through a drive by downloads. A Java Drive-By is a Java Applet that is coded in Java and is put on a website. Once you click "Run" on the pop-up, it will download a program off the internet. This program can be a virus or even a simple down-loader. It is a malicious script used to alter your computer. Emsisoft was tested against 19 of the best antivirus vendors, with 80 links to malicious 0 day malware. Emsisoft came out on top with a 95% detection rate, scoring even higher then Malwarebytes.

Emsisoft Interface:

[ Register or Signin to view external links. ]


Eset Smart Security 5 has been totally remodeled for easy use and setup. Compared to Eset Smart Security 4 this is a big upgrade. Their Smart Security product was way to advanced for the average user to use and control. This New model is very simple with even more features like; parental control and excellent malware removal. Usually when a piece of malware is by another internet security, registry keys are left behind which can still allow the malware to run even after removal. Eset fully removes everything associated with any type of malware infection. Eset Smart Security is now even lighter on your systems performance, compared to the previous version which slowed down your computer for everything.

Eset Smart Security Interface

[ Register or Signin to view external links. ]


Eset Free Online Scanner Offers a free test of their scanner which you can own free for life. Eset's scanner provides Anti-Stealth technology so you can run the scan without alerting other running programs. Toggle.com gave Eset's Free Scanner a rating of 5/5; it is a core scanner which protects the main components of the computer boosting the overall protection. Before you even begin a scan, Eset detects the current antivirus or internet security on your computer to prevent false positives.

Eset Interface:

[ Register or Signin to view external links. ]


F-Secure Internet Security 2012 is new but, very different then other internet securities/ F-Secure uses a behavior detector called DeepGuard which scans using statistics and numerous techniques to determine if something is malware. F-Secure has an overall detection rate of 91% which is very high. Although the detection rate is high, the false positive rate is almost just as high. As for Scareware/Rouges/Fake Antiviruses, F-Secure removed 100% of them, leaving nothing behind. As for Rootkits F-Secure claimed that 100% was removed but, traces were still left behind which still allowed the Rootkit to run. F-Secure has a lower effect on your computers performance, so you won't even notice it's there. It's firewall is weak and easily disabled with almost any exploit. F-Secure is good but does not hold up to the competition.

F-Secure Interface

[ Register or Signin to view external links. ]


G Data Internet Security 2012 is one of the best virus protections you can purchase! It received a detection rate of 99.8%. This is the best defense you can purchase for any of your computer, all though there is no to little online support, G Data still can handle itself. It has excellent malware detection, even with the two engines G Data uses to scan and protect your computer. G Data is extremely light on your computer so you'll never have to sacrifice performance for strength.

G Data Interface:

[ Register or Signin to view external links. ]


Kaspersky Internet Security 2012 Has had a total makeover for 2012; the detection rate has significantly increased by 13.6% making the detection rate at 99.2%. In a recent test, Kaspersky was tested with twenty 0 day malware. Kaspersky caught a total of 20/20 of the 0 day malware giving it's detection of new malware 100% (which is insane). There are many new features in their 2012 product that makes it 10 times better than their previous version. Kaspersky introduced a new Cloud scanner, which gathers information as you surf the web testing files before the even download on your computer for maximum protection. Kaspersky Really stepped up their game this year with their new cloud scanner and behavior blocker. The new 2012 version scans more in depth, as well as 2 times faster than the 2011 edition.

Kaspersky Interface:

[ Register or Signin to view external links. ]


Malwarebytes Anti-Malware is the best FREE protection you can provide for your computer, if your Antivirus misses something this will almost always catch it. You don't need internet connection to use this so you can boot this up in safe mode. If a virus keeps redirecting you, or isnt allowing you on the internet this will most likely detect the problem and remove it. Malwarebytes is used by dell to scan and remove viruses (Seriously); once you download it you have it free for life. If there is anything on your computer this program will find it.

Malwarebytes Interface

[ Register or Signin to view external links. ]


McAfee Total Protection 2012 has a unique interface, which is very different then other security suites. The interface is tall, but not wide. McAfee's Detection rate has a low score of 78%, when tested it failed to remove malware fully. For Rootkit detection and removal McAfee scored 39%. It missed more then half the Rootkits on the system, and constantly failed at removing them at reboot. For it's detection in Scareware/Fake Antiviruses/Rouges McAfee detected all of them. When installed on an infected system McAfee does a poor job at removing most of the threats leaving the system at risk. For Keeping malware off the system McAfee scored an 89%.

McAfee Interface:

[ Register or Signin to view external links. ]


Microsoft Security Essentials 2012 is a product created by Microsoft which has been aroung for some time. Microsoft Security Essentials has an overall detection rate of 92.7% which is amazing, but still not as good as other security suites. As for Ram, Security Essentials only takes around 40-50 mb when operating at full capacity, which is considerably light. Overall Microsoft Security Essentials 2012 is a 8.5 out of 10 it's not as amazing as some of the other products on the market. It occasionally misses very basic Scareware.

MSE Interface

[ Register or Signin to view external links. ]


Norton 360 Internet Security has come a long way from where it started. Norton was the worst in 2007, 2008, 2009 for how heavy it was on your computers performance. The 2012 Norton 360 Is there best work yet here's some of the new features: Sonar protection, Phishing protection toolbar, Pc Tune up, Back up storage up to 25GB of Space, etc... Nortons Auto protection scans a file the second it starts to download, the file is not allowed to start until it passes the first step to determine it's; File paths, coding, the site it's coming from. If the file fails to pass this step it is immediately quarantined to prevent damage to your computer. If a file makes it passed Norton Auto Protection Scanner that you don't know to whether or not if it safe the Sonar protection will catch it, it monitors your computer for suspicious behavior to quickly and accurately detect and stop new threats. Nortons Phishing protection, Blocks phishing websites that could steal your identity. Norton Pc Tune Up fine tunes key system settings, frees up memory and removes unnecessary clutter from your computers hard drive to help keep your PC running fast. When you purchase Norton 360 6.0 you gain access to 25GB of storage where you can back up and save anything on your computer, along with 24/7, 365 days online support. Norton 360 has been rated by Dell as the best internet security in the world, receiving an almost perfect score when tested 99.7% Detection Rate.

Norton 360 Interface:

[ Register or Signin to view external links. ]


Panda Global Protection 2012 is a good internet security, offering; Pc Tune-ups, Backups, and online Backups. For malware detection Panda Global Protection did not due to well, after Panda claimed that the malware infection was fully removed, traces were left behind which were a big risk to personal information and data. Panda's Detection of Rouge/Fake Antiviruses is a staggering 100%! This means it removes everything! Panda's Firewall, when tested preformed okay. As for detection of exploits it caught only 6 out of 30 which is terrible. Overall Panda Global Protection Costs too much and doesn't hold up to the competition.

Panda Global Protection Interface

[ Register or Signin to view external links. ]


Webroot Internet Security 2012 has one of the fasts scanners out! Webroot only takes 600kb to install, but has one of the most effective cloud scanners and behavior blocker. This internet Security is highly advanced in settings making it very difficult for an inexperienced user to control. Webroot Internet Security has a detection rate of 90% and constantly tracks the behavior of any file on your computer to check it's safety, if the file passes the first scan as safe, an hour or even a minute later if it's flagged as a risk it's automatically removed. Webroot has recently combined with Prevex 3.0 making the Rootkit detection insanely high, and increasing the scans speeds by more then double.

Webroot Internet Security Interface

[ Register or Signin to view external links. ]


Prices:

Avast Internet Security
  • 1 year protection 39.99$ (1 Pc)
  • 2 years protection 59.99$ (1 Pc)
  • 3 years protection 79.99$ (3 Pc)


AVG Internet Security
  • 1 year protection 49.99$ (1 Pc)
  • 2 years protection 84.99$ (1 Pc)


Bitdefender Internet Security
  • 1 year 79.95$ (3 Pc's)


Bullguard Internet Security
  • 1 year protection 59.99$ (3 Pc's)
  • 2 years protection 95.99$ (3 Pc's)
  • 3 years protection 119.99$ (3 Pc's)


Comodo Internet Security
  • 1 year protection 69.99$ (3 Pc's)
  • 2 years protection 118.99$ (3 Pc's)
  • 3 years protection 167.99 (3 Pc's)


Emsisoft Anti-Malware 2012
  • 1 year protection 50.00$ (1 Pc)
  • 1 year protection 90.00$ (3 Pc's)


Eset Smart Security 5
  • 1 year protection 59.99$ (1 Pc)
  • 2 years protection 89.99$ (1 Pc)


F-Secure Internet Security 2012
  • 1 year protection 49.99$ (1 Pc)


G Data Internet Security 2012
  • 1 year protection 34.99$ (1 Pc)
  • 2 years protection 44.99$ (1 Pc)


Kaspersky Internet Security 2012
  • 1 year protection 64.99$ (1-3 Pc's)
  • 2 years protection 119.99$ (1-3 Pc's)


Malwarebytes Anti-Malware
  • 1 year protection 24.99$ (1 Pc)


McAfee Total Protection 2012
  • 1 year protection 82.99$ (1-3 Pc's)


Microsoft Security Essentials 2012
  • 1 year protection FREE (1 Pc)


Norton 360 6.0
  • 1 year protection 40.00$ (1-3 Pc's)


Panda Global Protection 2012
  • 1 year protection 39.99$ (3 Pc's)
  • 2 years protection 67.99$ (3 Pc's)
  • 3 years protection 87.99$ (3 Pc's)


Webroot Internet Security 2012
  • 1 year protection 49.99$ (3 Pc's)


What's best for you

This chart created by Pc mag shows internet securities strong points and their weak points. If you are a heavy downloader you want something that has an amazing score at blocking malware. If you rarely ever download things and you want a nice, light internet security you want to look for a high score in performance. If you have a internet security that just doesn't hold up to your specific needs, switch it out for one that would be best for your everyday browsing. Having multiple Internet Securities is bad for any computer it puts stress in places where stress should't be in the first place. If you try something on the list of Internet Securities that I have tested and you feel as if your Pc is still performing slowly... You might want to run a couple of important critical scans, or downgrade on protection. You never want to sacrifice protection for performance.

[ Register or Signin to view external links. ]
[ Register or Signin to view external links. ]


Links to each Security Product

Avast

[ Register or Signin to view external links. ]

AVG

[ Register or Signin to view external links. ]

Bitdefender

[ Register or Signin to view external links. ]

BullGuard

[ Register or Signin to view external links. ]

Comodo

[ Register or Signin to view external links. ]

Comodo

[ Register or Signin to view external links. ]

Emsisoft

[ Register or Signin to view external links. ] [/font]

Eset Smart Security 5

[ Register or Signin to view external links. ]

Eset

[ Register or Signin to view external links. ]

F-Secure

[ Register or Signin to view external links. ]

G Data

[ Register or Signin to view external links. ]

Hitman Pro

[ Register or Signin to view external links. ]

Kaspersky

[ Register or Signin to view external links. ]

Kaspersky

[ Register or Signin to view external links. ]

Malwarebytes

[ Register or Signin to view external links. ]

McAfee

[ Register or Signin to view external links. ]

Microsoft

[ Register or Signin to view external links. ]

Norton

[ Register or Signin to view external links. ]

Panda

[ Register or Signin to view external links. ]

Webroot

[ Register or Signin to view external links. ]

How to determine what Os you have

This will be a simple guide on how to determine what Os you have for: Windows 7, Windows Vista and finally Windows Xp.

Windows 7

Simply click on the start icon located to the far left of your toolbar

[ Register or Signin to view external links. ]

From there you want to go over to computer

[ Register or Signin to view external links. ]

Once you are hoovering over computer you want to right click and select properties

[ Register or Signin to view external links. ]

After that this should pop up

[ Register or Signin to view external links. ]

You should be looking for "System Type"

[ Register or Signin to view external links. ]


Windows Vista

Simply click on the start icon located to the far left of your toolbar

[ Register or Signin to view external links. ]

From there you want to go over to computer

[ Register or Signin to view external links. ]

Once you are hoovering over computer you want to right click and select properties

[ Register or Signin to view external links. ]

After that this should pop up

[ Register or Signin to view external links. ]

You should be looking for "System Type"

[ Register or Signin to view external links. ]


Windows Xp

Simply click on the start icon located to the far left of your toolbar

[ Register or Signin to view external links. ]

Hover over "My Computer" and right click

[ Register or Signin to view external links. ]

Select properties

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Every computer with Windows Vista installed on it runs a 32bit Os


Speeding up your computer

Now a computer if not cleaned annually from it's junk files, temp files and cookies, it runs slower as time progresses. There are many different programs out there which claim they can speed up your computer like "Uniblue". Anything Uniblue is malware and it does more harm the good to your Pc. I have found numerous tools which clean your Pc for free and even come with "Your" Pc.

Tool 1: Disk Clean Up

This is a tool that come with every computer. I helps to free up the areas that get clustered the most with junk. It's the safest cleaner you can use for your computer plus it finishes in a estimated time of 1-13 minutes depending on how much you use your PC.

If you have a computer with Windows 7 or Vista Click this button

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Click on the search bar

[ Register or Signin to view external links. ]

Type in Run

[ Register or Signin to view external links. ]

Select this program

[ Register or Signin to view external links. ]

This will allow you to open/run any program you know the name to

[ Register or Signin to view external links. ]

Type in Cleanmgr

[ Register or Signin to view external links. ]

Click okay

[ Register or Signin to view external links. ]

Disk Clean up will pop up

[ Register or Signin to view external links. ]

Click okay

[ Register or Signin to view external links. ]

Wait for it to calculate how many file will be freed

[ Register or Signin to view external links. ]

Select everything "EXCEPT" Service pack back ups this is just if you want to uninstall future updates. You select this option but I do not recommend it.

[ Register or Signin to view external links. ]

[ Register or Signin to view external links. ]

Click okay

[ Register or Signin to view external links. ]

A prompt message will pop up

[ Register or Signin to view external links. ]

Select Delete files

[ Register or Signin to view external links. ]

If you have Windows Xp open up command prompt

[ Register or Signin to view external links. ]

Type in Cleanmgr

[ Register or Signin to view external links. ]

Simply Click enter and follow the previous steps


Tool 2: Disk Defragmenter

This tool comes with any computer. After a while your computer and it's files become a mess, do to constant downloading, removal and the moving of files. Disk Defragmenter moves all of the files and arranges them neatly together making access to any file quicker and easier.

If you have a computer with Windows 7 or Vista Click this button

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Click on the search bar

[ Register or Signin to view external links. ]

Type in Disk Defragmenter

[ Register or Signin to view external links. ]

Once you've typed that in click on this

[ Register or Signin to view external links. ]

Click Defragmenter Now

[ Register or Signin to view external links. ]

This Allows your disks to be freed of space

[ Register or Signin to view external links. ]

The process may take from 1-7 hours but, after your done with the Defragmenter your computer will run 2 times faster


Tool 3: CCleaner

This is a wonderful tool, it is 100% free. Here's what it does: It's cleans all of your temp files or as a matter of fact any file you choose. This will save you a lot of time plus free up your computer from junk. If you haven't clean your Pc in a while you'll notice a change in browsing speed almost instantly. Here's how to download it follow these steps.

Go to Piriform.com/ccleaner

[ Register or Signin to view external links. ]

Click Download

[ Register or Signin to view external links. ]

It will bring you to this screen

[ Register or Signin to view external links. ]

Click on Download from Piriform.com

[ Register or Signin to view external links. ]

Click on Start Download

[ Register or Signin to view external links. ]

A Security Warning will pop up

[ Register or Signin to view external links. ]

Click Run

[ Register or Signin to view external links. ]

Norton's Rating of this product

[ Register or Signin to view external links. ]

CCleaner's Set up

[ Register or Signin to view external links. ]

Click okay

[ Register or Signin to view external links. ]

The set up wizard will appear on your screen

[ Register or Signin to view external links. ]

Click Next

[ Register or Signin to view external links. ]

CCleaner License and Agreement

[ Register or Signin to view external links. ]

Read them thoroughly and Click I agree

[ Register or Signin to view external links. ]

CCleaner's Install option will appear, select the options you prefer

[ Register or Signin to view external links. ]

Click Install

[ Register or Signin to view external links. ]

The Instillation is complete

[ Register or Signin to view external links. ]

CCleaner's new updates along with their NEW Version 3.18 of this software

[ Register or Signin to view external links. ]

CCleaner's Intelligent Scan, this allows you to keep your cookies

[ Register or Signin to view external links. ]

You have two options: Yes, or No I select No but you can select differently

CCleaner's Interface Along with It's Options

[ Register or Signin to view external links. ]

CCleaner's Windows Options select EXACTLY What I select for OPTIMAL performance.

[ Register or Signin to view external links. ]

[ Register or Signin to view external links. ]

Once you have selected the recommended option click "Run Cleaner"

[ Register or Signin to view external links. ]

You will be prompted with a message, be sure to check "Do Show This Message Again" or else it will pop up every time you scan to clean your PC.

[ Register or Signin to view external links. ]

Click Okay

[ Register or Signin to view external links. ]

The finished Scan

[ Register or Signin to view external links. ]

Once you finish scanning everything with CCleaner you can uninstall it. Here's how:

Click tools

[ Register or Signin to view external links. ]

Click on CCleaner

[ Register or Signin to view external links. ]

[ Register or Signin to view external links. ]

Once you clicked on it click Run Installer

[ Register or Signin to view external links. ]

CCleaner Uninstaller Will open up

[ Register or Signin to view external links. ]

Then Click Next

[ Register or Signin to view external links. ]

The uninstaller will open

[ Register or Signin to view external links. ]


Maximizing your computers start up

Okay now this is a very crucial part of your computer, you can't just go in there clicking on things because you want a faster start up. You have to be very cautious to what you are going to un-check from your computers start up. Majority of the things that run at start up are useless because once your computers starts, if you've unchecked any critical files they'll still run at start up no matter what. I will make this a simple as possible.

If you have a computer with Windows 7 or Vista Click this button

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Click on the search bar

[ Register or Signin to view external links. ]

Type in Run

[ Register or Signin to view external links. ]

Select this program

[ Register or Signin to view external links. ]

This will allow you to open/run any program you know the name to

[ Register or Signin to view external links. ]

Type in msconfig

[ Register or Signin to view external links. ]

Click okay

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Click on Services

[ Register or Signin to view external links. ]

[ Register or Signin to view external links. ]

Click Hide all Microsoft Services

[ Register or Signin to view external links. ]

Now from there click on Start up

[ Register or Signin to view external links. ]

[ Register or Signin to view external links. ]

Only Select things like; Apple (Not iTunes if you want iTunes to function properly), Malwarebytes, Google updater, Google toolbar updater, Skype, Aim, Quick Set, Ask toolbar, any sort of toolbar updater.

To stop an item from running at start up click this box next to the process. The Check means it's running when the system first loads up

[ Register or Signin to view external links. ]

When you un-check a process it will look like this

[ Register or Signin to view external links. ]

When your finished click apply

[ Register or Signin to view external links. ]

Important note: If you disable something from start up it will still run. All you have to do is manually click on whatever you stopped. For instance if you stopped skype from running at start up, You can easily double click on a desktop shortcut to enable the program when your ready. Instead of it slowing down your computers boot up. Anything is reversible so if you've unchecked something before and now you would like to re-add it in the future just follow the steps to reopen System Configuration and recheck the Item you've unchecked in the passed.

If you have Windows Xp open Command prompt.

[ Register or Signin to view external links. ]

Type in Msconfig

[ Register or Signin to view external links. ]

This should open up system configuration simply follow the previous steps.


How to remove a virus

Viruses are very tricky and majority of the time you don't even know that you have them. If a Internet Security Fails to block a threat your computer can easily fall victim to many more. Compromising your personal information such as bank accounts, credit cards, passwords, ect... Now to ensure your safety I have found 3 of the best programs which are free of charge, which strive in various areas of your Pc. I'm listing the best, in order, so feel free to give them a try. If you believe you are infected with any virus scan with the following programs in order.

Program 1: Hitman Pro 3.6 Build 160

This is one astounding tool, it's strong points are; locating anything corrupt or out of place with the most critical part of your PC (System32). It's not like a normal antivirus product which scans with one scan engine. Hitman pro uses 7 antivirus engines to scan everything Important. Now I'm sure this raises a red flag for you for false positives. I can reassure you that this will find almost any threat and will have an extensively low false positive rate. This program is 100% free. Hitman Pro offers a free 30 day trail of their product so you can remove any infection lurking on your computer. There are 7 antivirus scanners which scan mainly System 32 & Stroke keys checking for TDL Rootkits, Key loggers, Trojans etc...

There are mainly five Antivirus programs which will be shown on the first page

Dr Web: This Antivirus program has been in service for over 9 years. It has teamed up with Android for protection as you surf the web. When tested with Over 4,700 Viruses, DrWeb Successfully detected 3,459 which gave it a detection rate of 72.8%

IKARUS: Is a 100% Full Antivirus protection, Nothing else It is the best at finding Anything that has to Java/Trojan/Backdoor wise. It has a 60-70% Detection Rate, Which has been tested on over 200 viruses, 123 were stopped while 87 made it through

G-Data: Is the absolute best scanner on there. G-Data Is a combination of two Antivirus Software products, Avast Internet Security & Bitdefender Internet Security. This Has 2 Scan engines which in result catch everything. The detection rate for G-Data is 99.8% the highest in the world. It can remove TDL1, TDL2, & TDL3 Rootkits which is extremely impressive!

Emsisoft: Is Australian Made... It is first in its class of any Malware detection. It scored higher for its malware detection in a test against Malwarebytes. The test was constructed of over 80 new Zero day malware, which in result was tested on 19 different vendors. Emsisoft scored the highest out of the 19 vendors [/font]

Bitdefender:Was recently added into Hitman Pro's collaboration of Antivirus scanners. This suite is amazing at simply everything, toppling the charts in phishing protection this is the smartest addition to Hitman Pro


Here's how to download Hitman Pro

Step 1: Go to Surfright.nl

[ Register or Signin to view external links. ]

Click on Downloads

[ Register or Signin to view external links. ]

Select the correct version of Hitman pro for your computer

[ Register or Signin to view external links. ]

Open the download when it finishes

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Click on Run

[ Register or Signin to view external links. ]

Click Default Scan

[ Register or Signin to view external links. ]

Select these EXACT options

[ Register or Signin to view external links. ]

Once You've done that select Next

[ Register or Signin to view external links. ]

Allow the scan to finish if it goes Red, you will need to active the free 30 day license to remove the found threats.

[ Register or Signin to view external links. ]

Once it finishes click Next

[ Register or Signin to view external links. ]

If the scan did not find anything then you're fine. If it did then I recommend you scan with the other two scanners to FULLY cleanse your PC. My computer is fine.

[ Register or Signin to view external links. ]

If it finishes and you have no found threats click Close

[ Register or Signin to view external links. ]

Important Note: If It found threats and it requests a reboot be sure to allow Hitman pro to cleanse your computer of the found infection(s). Among start up your computer will say a command line of Surfright.B.V. That is Hitman pro. What it does to fully remove a threat is; stop windows from starting until the threat(s) is FULLY removed. This process takes a matter of seconds. If you have a Rootkit or even a Trojan that has Hijacked a Windows Driver, Hitman pro will replace the Trojan with the proper restoration of the original driver before it was altered. Thus allowing your computer to function properly again.


How to use Hitman Pro

Once you've downloaded Hitman pro here's what you want to do. First Open Hitman Pro and click on settings.

[ Register or Signin to view external links. ]

Click on the Advanced options Tab

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Check this Exact option

[ Register or Signin to view external links. ]

Now once you've done that click Okay

[ Register or Signin to view external links. ]

Click the drop down arrow by Next and select Default Scan

[ Register or Signin to view external links. ]

Once the default scan has finshed removed the threats, if any were found and reopen Hitman pro. Click the drop down arrow next to next and select Early Warning Scan.

What does the EWS Do? It basically scan every start up object down to it's core. If something is suspicious it will mark it. If something is Unknown it will mark the reason on why it was marked as either suspicious or Unknown. I have no Viruses on my computer to show you but most of the time it will say Ignore. Click on the drop down tab and go to show information this will show you on why the file was marked and what made it show up.


Program 2: Malwarebytes Anti-malware

Now this is the second tool you should use to scan your Pc with. It's is 100% free and will determine the problem in a matter of minutes. Malwarebytes is the best FREE protection you can provide for your computer, if your Antivirus misses something this will almost always catch it. You don't need internet connection to use this so you can boot this up in safe mode. If a virus keeps redirecting you, or isnt allowing you on the internet this will most likely detect the problem and remove it. Malwarebytes is used by dell to scan and remove viruses (Seriously); once you download it you have it free for life. If there is anything on your computer this program will find it. This is a core scanner that will clean your PC of the worst type of infections and even Keyloggers.

Here's how to download Malwarebytes

Go to Malwarebytes.org

[ Register or Signin to view external links. ]

Click Download Now

[ Register or Signin to view external links. ]

The file should start to download

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Click Run

[ Register or Signin to view external links. ]

The installer will the pop up

[ Register or Signin to view external links. ]

Click Okay

[ Register or Signin to view external links. ]

The set up wizard will then pop up

[ Register or Signin to view external links. ]

Be sure to click on next

[ Register or Signin to view external links. ]

Check both of these options

[ Register or Signin to view external links. ]

Then click next

[ Register or Signin to view external links. ]

Read the important information then click Next

[ Register or Signin to view external links. ]

[ Register or Signin to view external links. ]

Choose where you would like to place this file or you can just click next

[ Register or Signin to view external links. ]

[ Register or Signin to view external links. ]

If this isn't your first time installing it you'll get this message

[ Register or Signin to view external links. ]

Otherwise just click Next

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Click Next

[ Register or Signin to view external links. ]

For this option you can select both, but I preferably just select this one.

[ Register or Signin to view external links. ]

Once you've done that click next

[ Register or Signin to view external links. ]

The final "Installation" step will pop up

[ Register or Signin to view external links. ]

Be sure to click Install

[ Register or Signin to view external links. ]

Now to finish be sure to check both of these options

[ Register or Signin to view external links. ]

Final Step click finish

[ Register or Signin to view external links. ]

Malwarebytes will run it's update

[ Register or Signin to view external links. ]

All you have to do is click okay

[ Register or Signin to view external links. ]


How to use Malwarebytes Anti-malware

This guide will make using Malwarebytes nice and simple. Once you have finished installing malwarebytes you will want to click on run a full scan. Be sure to select every drive there is on your computer. Most of the time you will only have a C: Drive and a D: Drive it differs depending on what you do and what you download.

[ Register or Signin to view external links. ]

Once you've selected all the options available, you'll want to click on Scan

[ Register or Signin to view external links. ]

Now the complete full scan will find 95% of the problems on your computer. It should take around 1-3 hours depending on how many file you have on your computer. For Malwarebytes to perform it's fastest scan you'll need to close a majority of everything. So basically the scan and nothing else.

If you have found a file on your PC that you know is a virus but, you can't remove it Malwarebytes File assassin will help destroy the file. Here's how to get to it.

Open up malwarebytes and click on "More Tools"

[ Register or Signin to view external links. ]

This is what the page should look like

[ Register or Signin to view external links. ]

From there you'll want to click on "Run Tool"

[ Register or Signin to view external links. ]

From there you can go to any file that is locked and remove it. This makes deleting programs that have broke or have an undetermined path easy to delete. This is a tool that you will want to use with cation. Before you PERMANENTLY delete any file you'll want to do some research on your own. Search up the program see if raises any red flags to other security vendors. Check for a valid signature, check who's the vendor of the application do some detective work.


Program 3: Eset Free Online Scanner

This is the final program to scan with if you have found infections with both of the other programs. It will Pick up what Hitman Pro and Malwarebytes Missed. This is one beast Scanner. Eset Offers a free test of their scanner which you can own free for life. Eset's scanner provides Anti-Stealth technology so you can run the scan without alerting other running programs. Toggle.com gave Eset's Free Scanner a rating of 5/5; it is a core scanner which protects the main components of the computer boosting the overall protection. Before you even begin a scan, Eset detects the current antivirus or internet security on your computer to prevent false positives.

Here's How to Download Eset's Free Online Scanner:

Go to eset.com/us/online-scanner/

[ Register or Signin to view external links. ]

Click Run Eset Online Scanner

[ Register or Signin to view external links. ]

This should Pop up

[ Register or Signin to view external links. ]

Click on the blue text

[ Register or Signin to view external links. ]

Once it's done downloading open this up

[ Register or Signin to view external links. ]

This will then pop up

[ Register or Signin to view external links. ]

Click on Run

[ Register or Signin to view external links. ]

The terms of use will then open up

[ Register or Signin to view external links. ]

Be sure to read through them thoroughly and then check this option

[ Register or Signin to view external links. ]

Once you've done that click start

[ Register or Signin to view external links. ]

Allow the program to fully update

[ Register or Signin to view external links. ]


How to Use Eset's Free Online Scanner

This program will find what Hitman Pro and Malwarebytes Missed. It is a magnificent tool and you can use if free for LIFE! Once you've downloaded The Scanner select Exactly what I select

[ Register or Signin to view external links. ]

After you've selected that click on Change...

[ Register or Signin to view external links. ]

This will pop up select EVERY option it gives you

[ Register or Signin to view external links. ]

Once you've done that click Okay

[ Register or Signin to view external links. ]

To prevent false positives Eset's Scanner finds your Internet Security

Click Show List

[ Register or Signin to view external links. ]

[ Register or Signin to view external links. ]

Once your ready Click Start

[ Register or Signin to view external links. ]

Let the Virus Signatures update

[ Register or Signin to view external links. ]

Scan In progress

[ Register or Signin to view external links. ] [/font]

If Eset finds anything harmful or any malware it will be quarantined instantly

[ Register or Signin to view external links. ] \

Important Note: Once you finish scanning it will provide you with two options Select both of them and your done.

[ Register or Signin to view external links. ]


How to remove a Rootkit/TDL Infection

What is a Rootkit? A Rootkit is A type of Trojan that keeps itself, other files, registry keys and network connections hidden from detection. It enables an attacker to have "root" access to the computer, which means it runs at the lowest level of the machine. A Rootkit Can cloke the presence of malware, trojans and all types of spyware, making the detection of anything almost impossible. Removing a Rootkit can be EXTREMELY Difficult for anyone. I have found numerous tools which will make finding and curing Rootkits easy.

Tool 1: Kaspersky Tdsskiller

This is a very powerful tool made by Kaspersky. If you have any type of driver that does not have a valid signature or has had it's default setting alter, this will notify you and mark the change. You can Ignore the file, Copy the file to quarantine and finally delete it. You have 3 of those options. Copy to quarantine sends the file to Kaspersky's Lab where experts analyse the file for malware characteristics or Rootkit type behavior.

Here's How To Download Kaspersky Tdsskiller

Go to support.kaspersky.com/faq/?qid=208283363

[ Register or Signin to view external links. ]

Click on Download TDSSkiler.exe

[ Register or Signin to view external links. ]

Once finished click on the download

[ Register or Signin to view external links. ]

This will open up

[ Register or Signin to view external links. ]

Click on Run

[ Register or Signin to view external links. ]

The TDSSkiller should open up

[ Register or Signin to view external links. ]


How To Use the TDSSkiller

Once downloaded click on Change Parameters

[ Register or Signin to view external links. ]

This will open up

[ Register or Signin to view external links. ]

Select these exact options

[ Register or Signin to view external links. ]

Once you've done that select okay

[ Register or Signin to view external links. ]

Click on Start Scan

[ Register or Signin to view external links. ]

Once the scan finishes check to see if you have any threats

[ Register or Signin to view external links. ]

For more information on the found threat click the arrow to descend the found information

[ Register or Signin to view external links. ]

Important Note: Now before you do anything you will need to research on your own if the programs found as suspicious are actually viruses. Don't just go off what the scan marked. Now something like this, if it goes as deep as a kernel driver and is marked as a Rootkit, you will need to select "Delete". Kaspersky will replace the infected file with a with the proper restoration of the original driver before it was altered to maintain system stability.

[ Register or Signin to view external links. ]

For anyone who doesn't know how dangerous a Rootkit is here is an example of what a it does to an ordinary windows driver.

[ Register or Signin to view external links. ]


Tool 2: Comodo Cleaning Essentials

This is one amazing product. You have 3 tools at your disposal each one of them is amazing. The first tool being Kill switch, this tool identifies running processes and checks them through Comodo's data base. If a process is unknown Kill switch will mark it gray if a process is marked Red then it is a risk to your computer, and Comodo will handle it. The Second tool is Autoruns. This gives you a full overview of every single file down to it's core on your PC. You can see file paths, command lines, publishers, everything. This tool gives you the power to stop anything you don't want running on your PC anymore. The third and final tool is Comodo Cleaning Essentials or in other words CCE. With this tool you can scan and remove any virus, rootkit, hidden files and malicious registry keys hidden deep within a system for any type of Rootkit.

Here's How to Download Comodo Cleaning Essentials

Go to comodo.com/business-security/network-protection/cleaning_essentials.php

[ Register or Signin to view external links. ]

Scroll down to the bottom

[ Register or Signin to view external links. ]

Click on Free Download

[ Register or Signin to view external links. ]

Select the Correct Download for your System use the drop down arrow for 64 bit

[ Register or Signin to view external links. ]

Once you've selected the correct version for "Your" Pc click on download

[ Register or Signin to view external links. ]

Once the downloads finished click here

[ Register or Signin to view external links. ]

A folder will pop up double click on this

[ Register or Signin to view external links. ]

Now double click on the application that says CCE

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Be sure to select Extract all or else the program will not work properly

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Simply Click on Extract

[ Register or Signin to view external links. ]

Once it's extracted double click on this folder again

[ Register or Signin to view external links. ]

You should have 3 programs available Autoruns, CCE and Killswitch

[ Register or Signin to view external links. ]
[ Register or Signin to view external links. ]
[ Register or Signin to view external links. ]

Important Note: Before you do anything refer to the How to use guide


How to Use Comodo Cleaning Essentials +More

Each one of these tools is complicated on it's own, this guide will make using them simple.

Auto Runs:

First you want to double click on Autoruns

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Be sure to click Run

[ Register or Signin to view external links. ]

Autoruns will then open up

[ Register or Signin to view external links. ]

If any process is marked as unsafe go to view and click on "Hide Safe Entries"

[ Register or Signin to view external links. ]

This will show you the Unsafe applications if you have any. In total I have 7 but, they're all unknown plus I already know what they all do so I'm fine. If you don't know and your curious research each found threat before you act on it.

[ Register or Signin to view external links. ]

Now with this tool you can pretty much optimize your computers start up and overall running speed. If you would like a faster start up click on Logon.

[ Register or Signin to view external links. ]

Be sure to check online to see if a program you want to un-check is needed before you do anything.

Important Note: This is an extremely advanced tool and should only be used if you know what your doing. If you download this and just start un-checking needed processes your computer will be come unstable and possible crash. Please be smart and research everything you find and do, it will save you in the long run.

CCE:

This is one amazing malware scanner, capable of removing viruses, rootkits, hidden files and malicious registry keys hidden deep within a system. This will check the system for changes that shouldn't be there and instantly fix them.

First you want to double click on CCE

[ Register or Signin to view external links. ]

Comodo Cleaning Essentials Will then open.

[ Register or Signin to view external links. ]

Click on Full Scan

[ Register or Signin to view external links. ]

You will be prompted for a reboot

[ Register or Signin to view external links. ]

Once you log back on Comodo Cleaning Essentials will begin to scan.

Killswitch:

First double click on Killswitch

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Click Run

[ Register or Signin to view external links. ]

Killswitch will then open up

[ Register or Signin to view external links. ]

This tool is EXTREMELY powerful. It gives you the power to fully monitor your entire system inside and out. This tool will help determine what's broken and fix it. Killswitch's network monitor will determine if your computer is part of a botnet or even a TDL4 Rootkit. You see EVERY Inbound and Outbound connection unsafe connections can be terminated and will be highlighted red.

If you would like to see every Inbound and Outbound connection click on this tab

[ Register or Signin to view external links. ]

This tool will fix programs that have been disabled that are needed to be run in order to maintain system stability.

[ Register or Signin to view external links. ]

Once you click on the Icon this will pop up

[ Register or Signin to view external links. ]

If anything is disabled be sure to click repair

[ Register or Signin to view external links. ]

Important Note: This is one highly advanced tool, if you like it you can replace the wimpy Task manager that comes with your PC for this. With these three tools you have the power to fix almost anything.


Virus Definitions

Drive-by Downloads: A drive-by download is computer code that takes advantage of a software bug in a Web browser to make it do something that the attacker wantssuch as run malicious code, crash the browser, or read data from the computer. Software bugs that are open to browser attacks are also known as vulnerabilities.

Phishing Attacks: A phishing attack occurs when an attacker displays Web pages or sends emails that claim to be from a trusted company. These pages or emails solicit sensitive information from an unwitting customer.

Spyware: Spyware is any software package that tracks and sends personally identifiable information or confidential information to third parties.

Viruses: Viruses are a type of malicious code, or malware, typically spread by other computers through email, downloads, and Web sites that are not safe.

Heuristically-Detected Virus: A heuristically-detected virus is found based on the malicious behaviors that it exhibits. These behaviors may include attempts to steal a person's sensitive information such as passwords or credit card numbers.

Worms: A worm is another type of malicious code, or malware, that focuses primarily on spreading to other vulnerable computer systems. It typically spreads by sending out copies of itself to other computers, either via email, instant messages, or some other service.

Unsolicited Browser Changes: An unsolicited browser change occurs when a Web site or program changes the behavior or settings of the Web browser without the user's consent. This may result in the home page or search page changing to another Web site, often one that is designed to serve ads or other unwanted content to the user.

Suspicious Browser Changes: A suspicious browser change occurs when a Web site attempts to modify the list of trusted Web sites. A Web site may be trying to get your Web browser to automatically download and install suspicious applications without your consent.

Dialers: A dialer is any software package that changes modem settings in order to dial a high cost toll number, or requests payment for access to particular content. The result of this attack is that the owner of the phone line is charged for services were never authorized.

Trackware: Trackware is any software package that tracks system activity, gathers system information, or tracks customer habits and relays this information to third-party organizations. The information gathered by such programs is neither personally identifiable nor confidential.

Hacking Tools: Hacking tools are programs used by a hacker or unauthorized user to attack, gain unwelcome access to, or perform identification or fingerprinting of your PC. Some hacking tools are used by system or network administrators for legitimate purposes, but the power they provide can also be misused by unauthorized users.

Joke Programs: A joke program is one that alters or interrupts the normal behavior of your computer, creating a general distraction or nuisance. Joke programs are programmed to perform various actions like causing the CD or DVD drive of your PC to open at random.

Security Risk: A security risk is a condition in which a computer is more vulnerable to an attack. This condition can be created when an otherwise innocent program contains an error that reduces the security of your computer. These errors are usually unintentional. Using such a program could increase the risk that your PC will be attacked.

Suspicious Application: A suspicious application is one with behavior that represents a potential risk to a computer. The behavior of such a program has been examined and determined to be unwanted and malicious.

Cybersquatting: Cybersquatting is the practice of acquiring a site name to attempt to deceive people about the identity of the organization running the site. Cybersquatting makes use of deceptive practices to mimic trusted brands or otherwise confuse users. Typosquatting is one form of cybersquatting in which name spelling variants are used.

Hard to Uninstall: These programs are difficult to uninstall. When they are uninstalled, they may leave behind files along with registry keys that cause the files to be run even after uninstallation.

Computer threats: Items such as viruses and worms that load directly on your computer, with the potential to do harm to your computer. Identity threats. Items such as spyware or keyloggers that attempt to steal personal information from your computer.

Ecommerce safety threats: Suspicious ecommerce activities, such as selling counterfeit goods. Annoyance factors. Items that don't necessarily do harm, but are a nuisance, such as joke programs or a site that isn't what it seems.

Pay per Click site: This indicates a Web site that includes the brand name in the Web site name, but is not affiliated with the brand owner and contains mostly advertisements or links to pages containing advertisements.

Rootkit: A rootkit is a form of malware that buries itself deep within the operating system in order to avoid detection and/or removal by anti-virus products. A rootkit will often attack installations of security products on a Windows machine, and will block all Internet traffic to the websites of security firms or to Windows Update. Through contact with servers, rootkits can download updates or changes for itself or even download completely different malware or other products, such as Fake anti-virus scams.

How to Nuke your Browser after removal of threats

I'm making this tutorial for; Google Chrome and Internet Explorer. Now if you download a lot, you've probably notice that your browser has slowed a lot. It may crash or even redirect you, this can be dangerous to you and your personal information. For example; if you've ever downloaded a program called iLivid it comes with a toolbar add on called Babylon. This is a redirecting virus that alters the original settings to your browser and home page. Even if an Antivirus Suite removes this threat the effects are still going to be there. This is where you can nuke your browser back to factory settings for everything, this will speed up your browser and on top of that remove the left over infections.

Internet Explorer

This works for any Internet Explorer. First if you have Windows Vista or Windows 7 hit this button.

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Click on the search bar

[ Register or Signin to view external links. ]

Type in Run

[ Register or Signin to view external links. ]

Select this program

[ Register or Signin to view external links. ]

This will allow you to open/run any program you know the name to

[ Register or Signin to view external links. ]

Type in Inetcpl.cpl

[ Register or Signin to view external links. ]

Once you've done that click okay

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Click on the settings tab for Browsing history

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Click on View Files

[ Register or Signin to view external links. ]

Every Cookie you've collected from browsing will be here

[ Register or Signin to view external links. ]

Select all of them or click "Ctrl A"

[ Register or Signin to view external links. ]

Right Click and select delete

[ Register or Signin to view external links. ]

You will be prompted with a message

[ Register or Signin to view external links. ]

Click yes

[ Register or Signin to view external links. ]

Now Click View Objects

[ Register or Signin to view external links. ]

Anything you've downloaded along with Temp internet files are in this folder

[ Register or Signin to view external links. ]

For me this file is empty, but if it were full you simply select everything, Right click, and hit delete. Now Close temporary internet files and history settings

[ Register or Signin to view external links. ]

You will now be back at the General settings page, Hover over these options.

[ Register or Signin to view external links. ]

Click on delete

[ Register or Signin to view external links. ]

Select all the options I have selected

[ Register or Signin to view external links. ]

Then Click on delete

[ Register or Signin to view external links. ]

Now your done with that stage. Next go to Security.

[ Register or Signin to view external links. ]

Click on "Reset All Zones to Default Level"

[ Register or Signin to view external links. ]

Now click apply

[ Register or Signin to view external links. ]

Your all finished with that step, now at the top Select Content.

[ Register or Signin to view external links. ]

Go to where it says certificates

[ Register or Signin to view external links. ]

Click Clear SSL State

[ Register or Signin to view external links. ]

The message you will receive

[ Register or Signin to view external links. ]

Click okay

[ Register or Signin to view external links. ]

Now go to advanced setting

[ Register or Signin to view external links. ]

Click on Restore advanced settings

[ Register or Signin to view external links. ]

Now click apply

[ Register or Signin to view external links. ]

This is how you default Internet Explorer back to factory settings. Click on reset.

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

Select this option

[ Register or Signin to view external links. ]

Once you've done that click reset

[ Register or Signin to view external links. ]

That's it that will reset the entire Internet explorer. If you had any add on's or redirects before that will fully remove them.


Google Chrome

First open Google Chrome

[ Register or Signin to view external links. ]

Click on the Wrench In the top right corner

[ Register or Signin to view external links. ]

Select Settings

[ Register or Signin to view external links. ]

Settings should then open up

[ Register or Signin to view external links. ]

Click on Manager Search Engines

[ Register or Signin to view external links. ]

This will pop up

[ Register or Signin to view external links. ]

If you have any search engine that you don't want hover over it and click the "X" in the right corner.

[ Register or Signin to view external links. ]

Now click on Extensions

[ Register or Signin to view external links. ]

This is the final part to removing any unwanted additions and freeing your browser. Click Remove on any extension you don't want.

[ Register or Signin to view external links. ]


Important Note: If you have had a redirect if you have one

Helpful Command Lines

This makes opening things you need much faster, instead of search everywhere for what you need opened you can just use command lines. Now in order for a command line to work you will need to have "Run" Open. With Run you can open any of these programs in an instance. If you have Windows Xp use command prompt.

Opens Disk Cleaner:

Cleanmgr

Opens Performance Monitor:

Perfmon

Opens Old Prefetch Data:

Prefetch

Opens Internet Settings:

inetcpl.cpl

Opens Up Control Pannel:

appwiz.cpl

Opens Up Temporary History:

Temp

Opens Up Temporary History:

%Temp%

Opens Up System Configuration:

Msconfig

How to stay protected

Now every day there is thousands and thousand of new viruses coming out or in other words "Zero Day Malware". Staying protected is not just hard but it is a constant battle for every security suite. My Recommendation is a pair up. Pair up you may ask? When I say pair up I don't mean have Kaspersky, Norton, and McAfee all on one computer. That is EXTREMELY bad and will shorten the life of your computer. I recommend that you Pair Hitman Pro with what any Security Suite you have along side with malwarebytes. Hitman Pro is very Light and the best part is it runs along side with your security suite so most of the time you won't even notice it's there. As for Malwarebytes, it's very heavy an most of time it conflicts with your computers overall performance. I recommend that you keep the set up file on your desktop so if you ever feel like your computer is infected you'll have the program to fix it right there. This means if you've installed it uninstall it until you need it.

Hopefully I've helped you with anything Feel free to leave a comment to what I need to add or what I messed up on thank you all

My old sticky hopefully you like the new one Forums/t=3417316.html


Last edited by Reminiscing ; edited 3 times in total

The following 14 users thanked Reminiscing for this useful post:

Dove (08-08-2012), JHendrix (08-05-2012), Mikey (08-04-2012), FrimmzHD (07-29-2012), gusta (07-25-2012), Elijah (07-24-2012), Mazur (07-18-2012), DaedricMcDaedricson (07-18-2012), Personalize (07-17-2012), Lost (07-17-2012), r00t (07-16-2012), DeTaiLz (07-16-2012), Vincenzo (07-16-2012), Reso (07-16-2012)
#2. Posted:
Vincenzo
  • Rated Awesome
Status: Offline
Joined: Apr 27, 201014Year Member
Posts: 2,214
Reputation Power: 120
Status: Offline
Joined: Apr 27, 201014Year Member
Posts: 2,214
Reputation Power: 120
GREAT post man, I can vouch that this guy knows what he's talking about 110%. Great guy and knows his stuff with computers, need any help PM him for virus help or any computer help.


-Finch
#3. Posted:
Nag
  • Retired Staff
Status: Offline
Joined: Jul 16, 200914Year Member
Posts: 944
Reputation Power: 83
Status: Offline
Joined: Jul 16, 200914Year Member
Posts: 944
Reputation Power: 83
Great post, very informative and guide full. Should help out many people if they're not lazy enough to read through the whole of that!
#4. Posted:
Pineapples
  • TTG Natural
Status: Offline
Joined: Oct 26, 201013Year Member
Posts: 964
Reputation Power: 47
Status: Offline
Joined: Oct 26, 201013Year Member
Posts: 964
Reputation Power: 47
Very detailed and helpful topic!

Reminiscing knows what he is talking about when it comes to computers!
#5. Posted:
Runite
  • TTG Senior
Status: Offline
Joined: Dec 22, 201112Year Member
Posts: 1,695
Reputation Power: 69
Status: Offline
Joined: Dec 22, 201112Year Member
Posts: 1,695
Reputation Power: 69
Not exactly sure why someone wouldn't know what their OS is but thanks for the list of anti-virus softwares.
#6. Posted:
Lost
  • Moderator
Status: Offline
Joined: Jul 17, 201013Year Member
Posts: 13,797
Reputation Power: 47610
Motto: PM me if you have any issues.
Motto: PM me if you have any issues.
Status: Offline
Joined: Jul 17, 201013Year Member
Posts: 13,797
Reputation Power: 47610
Motto: PM me if you have any issues.
Nice topic, looks like you put quite a bit of effort into it
#7. Posted:
r00t
  • Administrator
Status: Offline
Joined: May 18, 201112Year Member
Posts: 16,361
Reputation Power: 24344
Status: Offline
Joined: May 18, 201112Year Member
Posts: 16,361
Reputation Power: 24344
Top-notch, extremely comprehensive, and well-presented topic! I've been linking your old one for some time now and even trying a lot of these programs myself.

Excellent stuff, man.
#8. Posted:
Alberici
  • Comment King
Status: Offline
Joined: Jun 26, 201211Year Member
Posts: 2,533
Reputation Power: 68
Status: Offline
Joined: Jun 26, 201211Year Member
Posts: 2,533
Reputation Power: 68
Really great post! Thanks for the info I will look here when I need help!
*9dj9*
#9. Posted:
Famous
  • Retired Staff
Status: Offline
Joined: Dec 22, 201112Year Member
Posts: 17,361
Reputation Power: 6246
Status: Offline
Joined: Dec 22, 201112Year Member
Posts: 17,361
Reputation Power: 6246
Wow, congratz on the sticky bro, very nice thread.
#10. Posted:
Umbrella
  • TTG Natural
Status: Offline
Joined: Feb 11, 201113Year Member
Posts: 995
Reputation Power: 40
Status: Offline
Joined: Feb 11, 201113Year Member
Posts: 995
Reputation Power: 40
Awesome post!! Well deserved sticky!!
Jump to:
You are viewing our Forum Archives. To view or take place in current topics click here.