Latest Trends
Get the latest in Tech,
once a week. Free.
VR/AR
Security
How To Detect Malware Infection On Your ComputerNovember 13, 2024PC Guides / SecurityEven the most intelligent people among us can become prey to phishing attacks, malware, and viruses. This isn’t any myth.!!
Your computer or system may be affected by these malware or viruses without your knowledge. This could even happen even though both of your antivirus and firewall are active.
Simply, the practice you can follow is to be conscious about the symptoms to ensure that your computer is secure. Today you are gonna learn about some basic symptoms to detect malware infection on your computer.
If you are a newbie, you might want to understand what malware actually means. You can take a look at our article on Everything You Need To Know About Malware.
In spite of some earlier experiences, there is always some new malware with which we end up fighting more than ever.
Sometimes, simply every link we click launches up multiple new windows(browser), including a number of pop-ups that gives a confirmation that the computer is insecure. There isn’t anything new in that and anyone can be up against something of this type.
=>Random pop-ups and serious antivirus messages ( Like you system has ran into a problem, click here to solve ) that try to mislead you to enter your credit card information to solve the problem.
How Your Computer Is Infected Even When Antivirus Is Enabled
In this article we explore what exactly the capabilities of antivirus software are and help you understand how antivirus software works. You can see how you are vulnerable inspite
Read More
These are the most common signs of an unsecured system or a hacked system. Mostly Hackers use your fright of viruses or malware to sell their fake antivirus solutions. Meanwhile, your authorized antivirus software may suddenly be stopped or disabled.
=>Another significant sign of virus or malware is if you can’t download or install any antivirus software or other security software. even viruses or malware blocks all antivirus websites and may even prevent you from going online.
The above-mentioned cases are the most common symptoms to detect malware infection in any system.
Solution Of Above Problem:
In such conditions , your best option is to shutdown your computer and restart it in a Safe Mode . You can switch to safe mode by entering boot tab or even simply holding down the ” F8 ” key while your computer restarts.
Then use a program like Malwarebytes Anti-malware saved on disc or USB to scan your computer and remove the viruses and malware.
Other signs of an infection are more difficult to pin solely on viruses and other threats. For instance, if your programs become unresponsive or your computer slows down suddenly, it could be a malware causing the problems or may be other reasons, such as your computer running out of free memory or your hard drive being nearly full.
Viruses or malware can also cause your computer to restart or crash on its own, but this could also happen if your computer is overheated.
To be secured, keep your antivirus software updated (I recommend AVG ) and run a regular scan. You can also us Malwarebytes for extra assurance.
An Easy Way To Make Your Own Antivirus – Ultimate Tech DIY
Most of us use some famous antivirus like AVG, Avast etc. The main function of any of these antivirus software can be imitated by a simple trick. All you have to do is to
Read More
If nothing is found, you still have to troubleshoot and clean up your system by removing unwanted applications, but at least you will be sure that your computer is not infected. That itself is a worth of celebrating.
Do write to us about your experiences in fighting against malware, let’s help people out there detect malware infection much effectively. [...]
Delete Your Internet Usage History And Stay Private in Windows – Here’s How!November 8, 2024SecurityMost of the people don’t like others to know about their Internet usage history. Not only those who surf adult websites or chat rooms but also people who keep their personal information on shared computers.
Preserving our digital tracks from others and keeping data, or birthday or Christmas shopping private and keeping away ” prying eyes ” from make unwanted discoveries have become a norm in this information age.
How To Completely Get Rid Of Internet Explorer From Windows
Internet Explorer, known as IE is a web browser developed by Microsoft Corporation. Here is an easy method to completely remove Internet Explorer from PC
Read More
If any of these cases concern you, or if you are completely unprepared in securing your digital self it is absolutely vital that you make this your habit to avoid potential problems.
One can delete their Internet tracks in many ways. Today we are going to teach you the most advanced methods of deleting the tracks in the simplest way.
Method 1: Delete The Internet Usage History By Editing The Windows Registry (Advanced Technique)
Step 1: Open Windows Registry:
Open the Start menu and type “regedit” in the search bar. Press “Enter” when you’re done. Now double-click on the “regedit” icon and Wait until the program is opened. When it does, press “continue”.
Step 2: Search The Registry File:
Now press the “Control” + “F” keys to open the Search window. This allows you to start looking for specific log files.
Step 3: Path:
Type “HKEY_CURRENT_USER\Software\Microsoft” in the search window. Click the icon “more” once the list of results is in the Search window.
Discover How To Hide The Username From Google Chrome Window
The latest Google Chrome update has the name of the user associated with it, apprearing on the browser window. If can however hide this username on the right top by following
Read More
Step 4: Select The Browser:
Select the browser in which you want to clear the history. Here we have taken Internet Explorer, it is your choice to choose the browser and the procedure remains the same. Go to “Internet Explorer” —> “Explorer Bars”.
Step 5: Locate The Default Registry Entry:
Locate the Default registry entry file. This file will have the word “Default” in its name.
Step 6: Deleting The Data:
Right click and delete all registry entries under the Default registry entry. Make sure you do not delete the log entry Default that is above the Default Registry Entry, as this could seriously damage the ability to perform certain functions on your system.
Method 2: Delete Index.Dat Files
Step 1: Start Windows in Safe Mode:
You can usually do this by pressing the F8 key immediately after turning on your computer.
Step 2: Login as Administrator:
Your index.dat files, which contain information relating to the Internet usage history, are impossible to erase by Command Prompt if you have not signed in as an administrator.
Step 3: Command Line:
In Command Prompt, type “index·dat/s” and press “Enter”. Your index.dat files and its subdirectories will be erased.
Tips And Advice:
After deleting your files, delete all System Recovery Points for proper operation. Registration can be restored to a previous point using this tool.
If you don’t want to complicate your life doing this process manually, find a program to do it for you as CCleaner (which is free!), OSPC Privacy Cleaner, East-Tec Eraser 2007, Evidence Eliminator, Tracks Eraser Pro or Windows Washer.
To prevent forensic analysis on your hard drive, write the empty space on your hard drive using a tool like Eraser.
To disable Recent Documents in your start menu, right click on the Start button and select the Properties. Go to the Start Menu tab and click on the button Customize. Now move on to the Advanced tab. At the end, you’ll see a section of recent documents where you can uncheck “Show recently opened documents” option. There is also options to clean and maintain the displayed list section in the start menu.
Windows keeps a DNS cache to help you find the web pages. to see a list of recently viewed pages, open the CMD window (type CMD in the window “Run”) and type ipconfig/displaydns. This cache can be deleted by typing ipconfig/flushdns.
Configure Internet Explorer to automatically delete all temporary files when closed. This option can be found in the Advanced tab under the Tools menu of Internet Explorer/Internet Options. Alternatively, install Firefox instead of IE, which provides a tool to “Clear Private Data”.
Warnings:
In some limited cases, it may be possible for a skilled technician to reverse these changes.
Changes in system files that you hold for yourself are potentially dangerous and perform at your own risk. Trying to hide the history on your computer at work can lead to problems with the usage policy. Network administrators can access the server logs detailing network activity and workers, and firewalls also maintain records, as ISPs (Internet Service Providers).
Do not change the configuration of computer users without asking. It can be a hassle. Change the contents of a computer without legal right is a crime in many countries. [...]
6 Different Types Of Computer Viruses You Need To Be Careful AboutNovember 7, 2024PC Guides / SecurityThe most common misconception is whatever the malware is present in their computer; people simply take it as a virus. In most cases, it isn’t and surely identifying the malware is important in dealing with it.
So for this, developing an understanding of malware and its infection models is important.
Malware Is Malicious Software And Here’s Everything About It
Malware is the more common usage for malicious software; and is the broad term which describes the virus, worms, spyware and almost every such term which ..
Read More
A virus is a computer malware which enters your system, replicates itself usually damaging files. Since this is the characteristic feature of all biological viruses, the different types of computer virus are named so.
Although worms exhibit similar behavior, a computer virus is more complex and dangerous as they can take down large volumes of data, deleting the earlier files and occupying entire local drive.
Once this happens, retrieval of these so called infected files is also not possible. Hence it is also very important to understand what the different types of computer virus are.
Different Types Of Computer Viruses
These are how all the different types of computer virus can be categorized into,
#1 File Virus
These viruses are common with the executable files i.e. an .exe, .com, .vbs files. If you are running an infected executable file, you really are doing a big mistake!
Once you do this, you are giving it permission to run your computer as they enter your computer’s memory.
Even when you receive e-mails from an un-trusted source containing an executable file, we recommend you not to run such files and get yourself into trouble.
#2 Macro Virus
These viruses are common with the word processing document and other office tools like the Excel, PowerPoint and so on. Once these files are infected, it is almost impossible to recover such files.
#3 Master Boot Record and Boot Sector Virus
The master boot record file viruses are one of the most destructive types of a computer virus. The master boot record is what contains the code about what your computer is to do before your operating system starts up. This is because, though this virus resides on the hard drive, it isn’t in the windows partition.
How Your PC Can Get Infected Even When Antivirus Software Works Fine
In this article we explore what exactly the capabilities of antivirus software are and help you understand how antivirus software works and why a
Read More
This is because, though this virus resides on the hard drive, it isn’t in the windows partition. Due to this reason, you can’t delete this virus by simply re-installing your operating system. Also because they are present in the master boot record, their detection is also difficult.
#4 Multipartite Virus:
These viruses have hybrid nature and affect both the boot sector and program files. Hence are also called the hybrid virus. Since they affect both the areas at a time, multipartite viruses are often considered fast spreading viruses.
These viruses are very tricky and their elimination is difficult. It is because though this virus is cleaned from the infected files, it is confined to the boot sector and again has that chance to spread onto the program files.
Likewise, if you attempt clearing the virus from the boot sector they are still present in the program files and the boot sector can be re-infected. Hence the prevention is the best cure for these viruses.
#5 Polymorphic Virus:
These viruses are a real headache to the antivirus programs. It is because they change their virus signature, i.e. binary pattern every time they make copies of themselves and infects a new file. It affects data types and functions. Because of its nature, it is considered as a complicated virus.
#6 Stealth Virus:
These viruses concentrate mainly on staying undetected. They are capable of altering information about the file they are present in, in the memory. Their trickery can hide changes which are brought about due to their replication.
These are the different types of computer viruses. Note that the best way to fight viruses is to restrict their entrance into the computer itself.
How To Detect Malware Infection on Your Computer
Easy way to Detect Malware Infection On Your Computer. Let’s be honest, no one wants to own a computer that is infected with malicious programs. Therefore..
Read More [...]
Web Guides
Join Our Tech Community For Free
How To
How To Easily Block Remote Shutdown FeatureNovember 26, 2024PC HacksIf you are reading this article then most probably you have become a target to someone , right ? So, the people at your school or colleges have discovered the joys of Remote shutdown . That means you can no longer log into a system at your lab without being shutdown before you could check your e-mail. Even the admin might have no idea how to block it, or for whatever may be the reason they don’t want to block it .So what should you do now ? Here is the answer for that question ” easy way to block remote shutdown “.
If you are new here and want to learn how a remote shutdown is performed, you can look here.
Steps To Block Remote Shutdown :
Method 1 : Using Software :
1 . The simplest way is to download a Shutdown Guard . This is a neat Invisible program developed by ” Megabyte Studio ” .
2. After installing the Shutdown Guard application , drag a shortcut into your system’s startup folder. Your startup folder is located at Start Menu>All Programs>Startup . Or you can even open up this Shutdown Guard every time you startup your computer.
3. You have been protected.
Method 2 : By creating a batch file (.bat):
The alternative method to block remote shutdown is making a batch file (.bat).
Step 1 : First of all open a notepad (Type notepad in run or go to start->All programs->accessories->Notepad )
Now copy and paste the below given code into your text document:
@echo off
shutdown -a
shutdownguard.bat
Step 2 : Save That File :
=>Go to file menu and select the save as option .
=>Under file-type select “all programs” .
=>Keep the encoding as ” ANSI ” .
=>Save this file as ” OnlineCmag.bat ” .
=> Done.
Whenever you have logged into the computer open this program, or you can even add it to your start up programs . It is now virtually impossible to do a remote shutdown.
Congrats You have successfully blocked the remote shutdown process .
Share your views in form of comments ….
Also See: How Shutdown And Startup Operations Work [...]
Ever Tried To Remotely Shutdown Your PC? Here’s How ToNovember 26, 2024PC HacksIn this article, we gonna show you ” how to use the remote shutdown command ” in Windows. It is used to remotely shutdown, log off or restart a local or networked computer.
This method can be very advantageous if you have multiple computers at your workplace or at home. You can do a remote shutdown from the command prompt (CMD) using the shutdown command.
Things You will Need:
1. A computer that runs on Microsoft Windows.
2.Network Connection (which is required to find a target computer)
Step To Remotely Shutdown A Computer
Step 1: Open Command Prompt
Windows 7: Click on the ” Start ” menu And Select “Run…” from the given list. Now type “ cmd ” into the Run dialog and press enter.
Windows 8: Directly type ” command prompt ” in the search bar present on the side drag screen.
Step 2: Get the list of computers connected
Type ” net view ” command and press enter. Now a list of computers connected to that network will be displayed.
Step 3: Choose your target
Choose your target computer from the list and remember that computer name.
Step 4: Shutdown command
Now Type ” shutdown -m \\computer name ” in the command prompt. Replace ” -m with -f ” for closing all the running applications on the target computer.
You can also replace ” -m with -s ” For a normal shutdown or you can even replace “ -m with -r ” for restarting the target computer.
Some other commands are ” -e ” for documenting the reason of an unexpected shutdown, -i for displaying the graphic user interface ( GUI ) or -c to comment on the reason for the shutdown or restart. computer name is most probably where you should type the name of the target computer.
Step 5: Shut down
Now your target computer will automatically shutdown.
Note :
If you use this method for anything other than educational purposes you could get into lots and lots of trouble.
Now that you have learned how a computer can be remotely shutdown, you may also like to learn how to disable this remote shutdown. It is available at this link.
Share your views and experiences regarding this topic in the form of comments.. [...]
How To Change The Startup Programs on Your ComputerNovember 22, 2024PC HacksIs your PC running slower than ever? One reason could be because you have set too many startup programs. Now you might have already started thinking “What are these startup programs?”
These are programs which launch automatically when you start your computer.
These are programs which launch automatically when you start your computer. These programs can consume maximum resources and in fact, degrade your system performance, and by removing them you can free up vital space at boot.
In this article, we are going to show you an easy method to change your startup programs in Windows, GNU/Linux, and Mac OS.
Here’s How To Change The Startup Programs In ‘Windows’
Step 1: Open the task manager
You can open your task manager by pressing ” Ctrl+Alt+Del “ or even by searching it using ” Run ” ( For windows 7, XP ) or typing for it in search bar directly (For Windows 8 and above ).
Step 2: Click the Startup tab
You will see a tab in the ” Task Manager “, which says “ Startup “. Click on it.
Step 3: Disable the programs which are not necessary
Look up for programs which you haven’t been using. If you are unsure about any program then better move to More options, which is available if you right-click on the item. Just stay cautious and avoid disabling any of the important applications.
Step 4: Add programs
You can even add new programs to your startup list by adding the shortcuts to the Startup folder on your PC.
The address of the startup folder will look something like this: “C:\Users\OnlineCmag\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup “. Just replace ” OnlineCmag ” with the username for your PC.
Change The Startup Programs In ‘Mac OS X’
Well, if you are a Mac user, the process is similarly straight forward too. Follow these 4 simple steps and see the results.
Step 1: Open your computer’s dock and enter into the ” System Preferences “.
Step 2: Click on the ” Accounts ” option in the Menu.
Step 3: Click on the ” Log in Items ” tab.
Step 4: Click on the item which you want to remove from the startup programs list and click on the minus button.
If you want to add anything, just press the plus button and select that specific application.
Change The Startup Programs In ‘GNU/Linux’
Step 1: Edit the scripts in /etc/init.d
This directory contains all the start/stop scripts for various services used on your computer.
6 Point Cheat Sheet To Speed Up Your Slow Computer
Is your laptop or desktop slow in processing something? Is it too slow to upload files or applications, then it’s time to speed up your slow computer follow
Read More
Step 2: Use ” rcconf ” if you need any software help
This tool ( rcconf ) helps you to configure the system services in connection with system run-levels. In a simple manner, it will help you to turn the services on/off using the scripts present in ” /etc/init.d “.
If you are running the Ubuntu operating system, then you can change your startup programs by following this path: System -> Preferences -> Startup Applications. [...]