I'll be back!
Sorry about not updating my blog, I’ll be back! (soon perhaps!)
Sorry about not updating my blog, I’ll be back! (soon perhaps!)
Over the past few decades, computer security has become an important concern among users. Security vendors have faced tremendous challenges dealing with complex security threats with IT experts placing more effort on educating people. Nevertheless, there are many computer security myths that exist today and surprisingly, many people still believe them. In this blog post, we’ll reveal a few of the most common malware myths and the misconceptions that can put you at risk. ...
To help secure your computer against malware: If your computer is already infected or you are in doubt, first look at the Malware Removal Guide. Build up your malware defenses Install antivirus and antispyware programs from a trusted source Never download anything in response to a warning from a program you didn’t install or don’t recognize that claims to protect your PC or offers to remove viruses. It is highly likely to do the opposite. Get reputable anti-malware programs from a vendor you trust. I recommend Avira. It’s highly recommended that you create another layer of protection beyond Avira. This second layer could be composed with Malwarebytes’ Anti-Malware, Hitman Pro or any other on-demand antimalware software. Use a safe browser with good extensions I recommend Google Chrome and Here is my suggested list of extensions for a safe navigation. Update software regularly Cybercriminals are endlessly inventive in their efforts to exploit vulnerabilities in software, and many software companies work tirelessly to combat these threats. That is why you should: ...
If after following this guide you failed disinfecting your computer, or you cannot follow this guide yourself, I will be available to help you. The most important thing in fighting malwares is: Do NOT Panic. Do NOT Hurry. Do NOT ignore any step in removal guide unless I tell you. This manual for removing malwares can be used for either minor or major malware infection. Download and Burn Avira Rescue CD to a blank Disc, Boot your computer using that and let it scan and remove malwares detected (How to use Avira Rescue CD?). Restart your computer into safe-mode with networking. (How to use Safe Mode?) Clean temporary files using TFC. [Let it reboot your computer, come back to Safe Mode With Networking] Download HitmanPro to your desktop, run it in force breach mode (Click here to learn how) and click next to scan your computer, let it remove the malwares it find, if it ask you for license active the 30 Days trial version. after removal, restart your computer. [Try it in Safe Mode With Networking] Download, install and update Malwarebytes Antimalware, let it scan your computer and remove everything it find [Try in Safe Mode With Networking]. Download and run avast! Browser Cleanup to cleanup and reset your browsers. Download and install HostsMan. after install run it, click on “update Hosts”, choose “MVPS Hosts” (and you may choose “Peter Lowe’s AdServers List” for blocking Ads) and in below options choose “Overwrite Current” hosts. this step would immunize your Hosts File and would prevent any internet traffic to malware sites/domains and also would fix Windows Hosts File if it has been HiJacked by malwares. Disable System Restore and then re-enable it again. Learn more how and why? If you have windows installation disc, insert it into drive, open Run command from start menu (In windows vista/7, open start menu and type ‘Run’ and then press enter) and type ‘sfc /scannow’. this will check windows for mission or corrupted files and will restore them from disc. sometimes during getting infection or malware removal some files might get corrupted or being deleted which this action will solve it. Make sure your windows and all installed programs are fully updated and there are no insecure program: Check for Update. also you may do some additional scans too, here is some of them: ...
Hello ‘Omid’s Blog!’ readers! I wish you all a year full of fun, happiness and health in the 2011, hope all your dreams come true in the new year. Best Wishes -Omid
For the first time ever since the evolution of the Internet, if you went that far!, Facebook received more web visits than Google UK site, on a single day… Christmas Day. Google’s traffic share is constantly between 8-10% in U.K., while Facebook’s is well between 8-6%. Facebook accounted for 10.50% of the internet traffic in the U.K. on December 25th, marginally surpassing Google (9.77%). So, why was Facebook your favorite website on that day? You tell us! ...
New York, December 27th (TradersHuddle.com) – Shares of Red Hat, Inc. (NYSE:RHT) are trading very close to calculated support at $45.27 with current price action closing at just $46.51 places the stock price near levels where traders will start paying attention. Red Hat, Inc. (NYSE:RHT) develops and provides open source software and services, including the Red Hat Linux operating system. Red Hat’s current stock range is defined by current calculated support defined at $45.27 and by the resistance level at $48.78, which should be used by traders planning their trades. ...
A new study from New York securities firm NYPPEX estimates Facebook’s enterprise value is now much higher than Yahoo and EBay, at $41.2 billion and significantly higher than other fast growing startups like LinkedIn, Twitter, Zynga, and Groupon. Facebook’s value has shot up 56 percent since the middle of 2010. None of the startups mentioned above have gone public but many let their employees sell shares in private markets as an incentive for their valued staff members. The private markets let investors buy a piece of a company early on but it is difficult to determine what the price of a share should be. ...
Google really isn’t happy with its TV operating system. In addition to telling companies not to mention their Google TV products at CES next month, now it looks like the search company is actively stopping production on a device that’s already been released. According to a report on Digitimes.com, Logitech has ordered a suspension of all Logitech Revue components from its supplier, Gigabyte Technology. The Revue is Logitech’s set-top box that turns any TV into a Google TV. ...
Washington Post: The CIA has launched a task force to assess the impact of the exposure of thousands of U.S. diplomatic cables and military files by WikiLeaks. Officially, the panel is called the WikiLeaks Task Force. But at CIA headquarters, it’s mainly known by its all-too-apt acronym: W.T.F. The irreverence is perhaps understandable for an agency that has been relatively unscathed by WikiLeaks. Only a handful of CIA files have surfaced on the WikiLeaks Web site, and records from other agencies posted online reveal remarkably little about CIA employees or operations. ...