Latest Trends
Get the latest in Tech,
once a week. Free.
VR/AR
Security
How To Detect Malware Infection On Your ComputerNovember 13, 2024PC Guides / SecurityEven the most intelligent people among us can become prey to phishing attacks, malware, and viruses. This isn’t any myth.!!
Your computer or system may be affected by these malware or viruses without your knowledge. This could even happen even though both of your antivirus and firewall are active.
Simply, the practice you can follow is to be conscious about the symptoms to ensure that your computer is secure. Today you are gonna learn about some basic symptoms to detect malware infection on your computer.
If you are a newbie, you might want to understand what malware actually means. You can take a look at our article on Everything You Need To Know About Malware.
In spite of some earlier experiences, there is always some new malware with which we end up fighting more than ever.
Sometimes, simply every link we click launches up multiple new windows(browser), including a number of pop-ups that gives a confirmation that the computer is insecure. There isn’t anything new in that and anyone can be up against something of this type.
=>Random pop-ups and serious antivirus messages ( Like you system has ran into a problem, click here to solve ) that try to mislead you to enter your credit card information to solve the problem.
How Your Computer Is Infected Even When Antivirus Is Enabled
In this article we explore what exactly the capabilities of antivirus software are and help you understand how antivirus software works. You can see how you are vulnerable inspite
Read More
These are the most common signs of an unsecured system or a hacked system. Mostly Hackers use your fright of viruses or malware to sell their fake antivirus solutions. Meanwhile, your authorized antivirus software may suddenly be stopped or disabled.
=>Another significant sign of virus or malware is if you can’t download or install any antivirus software or other security software. even viruses or malware blocks all antivirus websites and may even prevent you from going online.
The above-mentioned cases are the most common symptoms to detect malware infection in any system.
Solution Of Above Problem:
In such conditions , your best option is to shutdown your computer and restart it in a Safe Mode . You can switch to safe mode by entering boot tab or even simply holding down the ” F8 ” key while your computer restarts.
Then use a program like Malwarebytes Anti-malware saved on disc or USB to scan your computer and remove the viruses and malware.
Other signs of an infection are more difficult to pin solely on viruses and other threats. For instance, if your programs become unresponsive or your computer slows down suddenly, it could be a malware causing the problems or may be other reasons, such as your computer running out of free memory or your hard drive being nearly full.
Viruses or malware can also cause your computer to restart or crash on its own, but this could also happen if your computer is overheated.
To be secured, keep your antivirus software updated (I recommend AVG ) and run a regular scan. You can also us Malwarebytes for extra assurance.
An Easy Way To Make Your Own Antivirus – Ultimate Tech DIY
Most of us use some famous antivirus like AVG, Avast etc. The main function of any of these antivirus software can be imitated by a simple trick. All you have to do is to
Read More
If nothing is found, you still have to troubleshoot and clean up your system by removing unwanted applications, but at least you will be sure that your computer is not infected. That itself is a worth of celebrating.
Do write to us about your experiences in fighting against malware, let’s help people out there detect malware infection much effectively. [...]
Delete Your Internet Usage History And Stay Private in Windows – Here’s How!November 8, 2024SecurityMost of the people don’t like others to know about their Internet usage history. Not only those who surf adult websites or chat rooms but also people who keep their personal information on shared computers.
Preserving our digital tracks from others and keeping data, or birthday or Christmas shopping private and keeping away ” prying eyes ” from make unwanted discoveries have become a norm in this information age.
How To Completely Get Rid Of Internet Explorer From Windows
Internet Explorer, known as IE is a web browser developed by Microsoft Corporation. Here is an easy method to completely remove Internet Explorer from PC
Read More
If any of these cases concern you, or if you are completely unprepared in securing your digital self it is absolutely vital that you make this your habit to avoid potential problems.
One can delete their Internet tracks in many ways. Today we are going to teach you the most advanced methods of deleting the tracks in the simplest way.
Method 1: Delete The Internet Usage History By Editing The Windows Registry (Advanced Technique)
Step 1: Open Windows Registry:
Open the Start menu and type “regedit” in the search bar. Press “Enter” when you’re done. Now double-click on the “regedit” icon and Wait until the program is opened. When it does, press “continue”.
Step 2: Search The Registry File:
Now press the “Control” + “F” keys to open the Search window. This allows you to start looking for specific log files.
Step 3: Path:
Type “HKEY_CURRENT_USER\Software\Microsoft” in the search window. Click the icon “more” once the list of results is in the Search window.
Discover How To Hide The Username From Google Chrome Window
The latest Google Chrome update has the name of the user associated with it, apprearing on the browser window. If can however hide this username on the right top by following
Read More
Step 4: Select The Browser:
Select the browser in which you want to clear the history. Here we have taken Internet Explorer, it is your choice to choose the browser and the procedure remains the same. Go to “Internet Explorer” —> “Explorer Bars”.
Step 5: Locate The Default Registry Entry:
Locate the Default registry entry file. This file will have the word “Default” in its name.
Step 6: Deleting The Data:
Right click and delete all registry entries under the Default registry entry. Make sure you do not delete the log entry Default that is above the Default Registry Entry, as this could seriously damage the ability to perform certain functions on your system.
Method 2: Delete Index.Dat Files
Step 1: Start Windows in Safe Mode:
You can usually do this by pressing the F8 key immediately after turning on your computer.
Step 2: Login as Administrator:
Your index.dat files, which contain information relating to the Internet usage history, are impossible to erase by Command Prompt if you have not signed in as an administrator.
Step 3: Command Line:
In Command Prompt, type “index·dat/s” and press “Enter”. Your index.dat files and its subdirectories will be erased.
Tips And Advice:
After deleting your files, delete all System Recovery Points for proper operation. Registration can be restored to a previous point using this tool.
If you don’t want to complicate your life doing this process manually, find a program to do it for you as CCleaner (which is free!), OSPC Privacy Cleaner, East-Tec Eraser 2007, Evidence Eliminator, Tracks Eraser Pro or Windows Washer.
To prevent forensic analysis on your hard drive, write the empty space on your hard drive using a tool like Eraser.
To disable Recent Documents in your start menu, right click on the Start button and select the Properties. Go to the Start Menu tab and click on the button Customize. Now move on to the Advanced tab. At the end, you’ll see a section of recent documents where you can uncheck “Show recently opened documents” option. There is also options to clean and maintain the displayed list section in the start menu.
Windows keeps a DNS cache to help you find the web pages. to see a list of recently viewed pages, open the CMD window (type CMD in the window “Run”) and type ipconfig/displaydns. This cache can be deleted by typing ipconfig/flushdns.
Configure Internet Explorer to automatically delete all temporary files when closed. This option can be found in the Advanced tab under the Tools menu of Internet Explorer/Internet Options. Alternatively, install Firefox instead of IE, which provides a tool to “Clear Private Data”.
Warnings:
In some limited cases, it may be possible for a skilled technician to reverse these changes.
Changes in system files that you hold for yourself are potentially dangerous and perform at your own risk. Trying to hide the history on your computer at work can lead to problems with the usage policy. Network administrators can access the server logs detailing network activity and workers, and firewalls also maintain records, as ISPs (Internet Service Providers).
Do not change the configuration of computer users without asking. It can be a hassle. Change the contents of a computer without legal right is a crime in many countries. [...]
6 Different Types Of Computer Viruses You Need To Be Careful AboutNovember 7, 2024PC Guides / SecurityThe most common misconception is whatever the malware is present in their computer; people simply take it as a virus. In most cases, it isn’t and surely identifying the malware is important in dealing with it.
So for this, developing an understanding of malware and its infection models is important.
Malware Is Malicious Software And Here’s Everything About It
Malware is the more common usage for malicious software; and is the broad term which describes the virus, worms, spyware and almost every such term which ..
Read More
A virus is a computer malware which enters your system, replicates itself usually damaging files. Since this is the characteristic feature of all biological viruses, the different types of computer virus are named so.
Although worms exhibit similar behavior, a computer virus is more complex and dangerous as they can take down large volumes of data, deleting the earlier files and occupying entire local drive.
Once this happens, retrieval of these so called infected files is also not possible. Hence it is also very important to understand what the different types of computer virus are.
Different Types Of Computer Viruses
These are how all the different types of computer virus can be categorized into,
#1 File Virus
These viruses are common with the executable files i.e. an .exe, .com, .vbs files. If you are running an infected executable file, you really are doing a big mistake!
Once you do this, you are giving it permission to run your computer as they enter your computer’s memory.
Even when you receive e-mails from an un-trusted source containing an executable file, we recommend you not to run such files and get yourself into trouble.
#2 Macro Virus
These viruses are common with the word processing document and other office tools like the Excel, PowerPoint and so on. Once these files are infected, it is almost impossible to recover such files.
#3 Master Boot Record and Boot Sector Virus
The master boot record file viruses are one of the most destructive types of a computer virus. The master boot record is what contains the code about what your computer is to do before your operating system starts up. This is because, though this virus resides on the hard drive, it isn’t in the windows partition.
How Your PC Can Get Infected Even When Antivirus Software Works Fine
In this article we explore what exactly the capabilities of antivirus software are and help you understand how antivirus software works and why a
Read More
This is because, though this virus resides on the hard drive, it isn’t in the windows partition. Due to this reason, you can’t delete this virus by simply re-installing your operating system. Also because they are present in the master boot record, their detection is also difficult.
#4 Multipartite Virus:
These viruses have hybrid nature and affect both the boot sector and program files. Hence are also called the hybrid virus. Since they affect both the areas at a time, multipartite viruses are often considered fast spreading viruses.
These viruses are very tricky and their elimination is difficult. It is because though this virus is cleaned from the infected files, it is confined to the boot sector and again has that chance to spread onto the program files.
Likewise, if you attempt clearing the virus from the boot sector they are still present in the program files and the boot sector can be re-infected. Hence the prevention is the best cure for these viruses.
#5 Polymorphic Virus:
These viruses are a real headache to the antivirus programs. It is because they change their virus signature, i.e. binary pattern every time they make copies of themselves and infects a new file. It affects data types and functions. Because of its nature, it is considered as a complicated virus.
#6 Stealth Virus:
These viruses concentrate mainly on staying undetected. They are capable of altering information about the file they are present in, in the memory. Their trickery can hide changes which are brought about due to their replication.
These are the different types of computer viruses. Note that the best way to fight viruses is to restrict their entrance into the computer itself.
How To Detect Malware Infection on Your Computer
Easy way to Detect Malware Infection On Your Computer. Let’s be honest, no one wants to own a computer that is infected with malicious programs. Therefore..
Read More [...]
Web Guides
Join Our Tech Community For Free
How To
How to Do a Full Shutdown Without Disabling the hybrid shutdownDecember 3, 2024PC HacksWindows 8 comes with a new feature know as Hybrid Boot , which decreases the boot times. But for the time being you may be needed to do a classic shutdown i.e a full shutdown . In this article we gonna show an easy way to do full shutdown without disabling your Hybrid Boot.
Steps To Follow : For A Full Shutdown ( Quickly ) :
Step 1 : Creating a Shortcut :
Right click on your Desktop and click on create a new shortcut option Under New category .
Step 2 : Set a Shortcut path :
Now after clicking on ” create a new shortcut ” option , you will be asked ” What Item You Would Like To Create A shortcut For ?” Then type in the following path .
shutdown /s /t 0
Step 3 : Assigning a name :
Give your shortcut a name like shutdown or full shutdown or anything you like .
Step 4 : Select An Icon :
After creating your shortcut, right click on it and move on to its properties. Now click on Change Icon button. Here I am choosing one of the default icons that comes in with Windows, but are free to choose your own icon.
Step 5 : Pin It To Your Start Screen :
Pin this shortcut to your start menu so that you can access it easily .
Step 6 : Full Shutdown :
To do a full shutdown just you need to click on that shortcut.
Share Your Views In Form Of Comments….. [...]
How to Delete a Program Completely by Modifying the Registry (Windows)December 2, 2024PC HacksEven if you have Deleted a program from your computer, Still it may leave some remnant links in your files . In order to delete those files completely , just follow the steps given below .
Steps To Delete A Program Completely By Using Windows Registry :
Step 1 : Open your control panel and uninstall the program which you want to remove .
Step 2 : Now you have to get rid of the registry files pointing towards that program. Open your computer registry .
Step 3 : Go to the File menu and Click on the Export option . Now a save as dialog box will be displayed . Save your file in ” c:\ ” ( i.e c-drive) with a name like registry_backup . Click on save .
Step 4 : Go to Edit menu and click on the Find option, You can also do it by pressing ” control+f ” .
Step 5 : Now type in the program name which you want to delete.
Step 6 : Once if an item is found, Then read to make sure that it is a link to that program.
Step 7 : Right Click on the file and select delete option to remove it.
Continue this process by pressing F3 and deleting the items linking to the program, until all the links are deleted.
Warning :
=>Always remember that the registry is the heart of your Windows. if you made even a small mistake, your Windows will no longer work . So backup or export it before doing any changes. If have any doubt, better don’t do it!
=> There are some important keys in the registry, if removed they will break other functioning programs or even windows itself.
=>Don’t delete anything other than what is needed. Make sure to backup your registry beforehand.
=> Editing your computer registry is very dangerous and it should only be done in some extreme cases. [...]
How to Get Into Your Computer’s Windows RegistryDecember 2, 2024PC HacksHave you ever wonder about a way to get into your computer’s Windows Registry? Well no worries, In this article we gonna show you how to get into your Windows Registry . Follow the following steps given below.
Steps To Get Into A Computer Registry :
This Is How You Can Create a System Restore Point :
Step 1 : Click on the Start menu :
Before using your Registry Editor, it is always advisable to create a System Restore point . If any changes that you have made went wrong then this system restore point will help you to roll back and restore your computer .
Step 2 : Follow the path :
Go to All Programs => Accessories => System or System tools => System Restore . Now left click on the system restore, then a window will pop up . This window will give you a choice of creating a restore point or restoring your computer .
Step 3 : Create a restore point :
These are the necessary precautions to be taken. This Restore points will restore your system to that date ( Restore date ) If you have made any mistake on ” regedit “. Once you have made a restore point, close the system restore.
Opening the Window’s Registry Editor :
Step 1 : Open “Run” . You can access it from the Start menu or Directly press Windows+R to open it .
Step 2 : Type ” regedit ” in your Run dialog box and press enter . This will open your computer registry. But be very cautious when you are adjusting the computer registry, as you can cause your system to become incurable.Once you are in the registry, you can use it to remove old and unwanted programs or change your History folder location and many more.
Note :
=>If you do even a small mistake, literally your windows will be crashed !
=>Be Very careful when editing your computer registry!
Learn how to delete a program by modifying the Windows Registry here. [...]