This is Your New Weapon Against Various Types of Diseases That May Harm Your Computer !



Dear visitors, I believe you all must have known what we wrote in this blog maybe even some of you look at this blog is not useful to add to your knowledge in computer security. But one thing we want to achieve by writing this blog, there may be a small part of you that knows the ins and outs and less security risk internet-connected computer. 

Many of the end of the internet either consciously or not has become a victim of fraud due to various forms of attack by those who called malware.

Berkas:Msf3-hashdump small.jpg


Whether it's malware?

Malware, short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.

File: statika Malware 2011-03-16-en.svg

Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious BHOs, rogue security software, govware, and other malicious programs; the majority of active malware threats are usually worms or trojans rather than viruses. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states. 

Malware is different from defective software, which is a legitimate software but contains harmful bugs that were not corrected before release. However, some malware is disguised as genuine software, and may come from an official company website in the form of a useful or attractive program which has the harmful malware embedded in it along with additional tracking software that gathers marketing statistics.

Many early infectious programs, including the first Internet Worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments alike primarily to steal sensitive information of personal, financial, or business importance.

Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general. However, malware is often used against individuals to gain personal information such as social security numbers, bank or credit card numbers, and so on. 

Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for black-market exploitation. Infected "zombie computers" are used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.

Another category of malware has emerged, called spyware. These programs are designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues to the spyware creator. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be packaged together with user-installed software, such as peer-to-peer applications.

The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any specific types of behavior. The term computer virus is used for a program that has infected some executable software and, when run, causes the virus to spread to other executables. 

On the other hand, a worm is a program that actively transmits itself over a network to infect other computers. These definitions lead to the observation that a virus requires user intervention to spread, whereas a worm spreads itself automatically. Using this distinction, infections transmitted by email or Microsoft Word documents, which rely on the recipient opening a file or email to infect the system, would be classified as viruses rather than worms.

For a malicious program to accomplish its goals, it must be able to run without being detected, shut down, or deleted. When a malicious program is disguised as something normal or desirable, users may willfully install it without realizing it. This is the technique of the Trojan horse or trojan. In broad terms, a Trojan horse is any program that invites the user to run it, concealing harmful or malicious code. The code may take effect immediately and can lead to many undesirable effects, such as deleting the user's files or installing additional harmful software. One of the most common ways that spyware is distributed is as a Trojan horse, bundled with a piece of desirable software that the user downloads from the Internet. When the user installs the software, the spyware is installed along with it. 

Spyware authors who attempt to act in a legal fashion may include an end-user license agreement that states the behavior of the spyware in loose terms, which users may not read or understand. (Read our article : http://mypcdefender.blogspot.com/2014/02/baidu-pc-faster-foistware_18.html)

Once a malicious program is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a malicious process from being visible in the system's list of processes, or keep its files from being read. Some malicious programs contain routines to defend against removal, not merely to hide themselves.

A backdoor is a method of bypassing normal authentication procedures. Once a system has been compromised, one or more backdoors may be installed in order to allow easier access in the future. Backdoors may also be installed prior to malicious software, to allow attackers entry. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. Recently it came to light that government agencies have been preinstalling backdoors on private computers purchased online. Backdoors secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors crackers may use Trojan horses, worms, Implants or other methods.

Grayware (or greyware) is a general term that refers to applications or files that are not directly classified as malware (like worms or trojan horses), but can still negatively affect the performance of computers and involve significant security risks. It describes applications that behave in an annoying or undesirable manner, and yet are less serious or troublesome than malware. Grayware encompasses spyware, adware, dialers, joke programs, remote access tools and any other program apart from a virus, that is designed to harm the performance of computers. The term is in use since around 2004.

Another term, PUP, which stands for Potentially Unwanted Program (or PUA Potentially Unwanted Application), refers to applications that would be considered unwanted despite having been downloaded by the user (users may fail to read a download agreement). PUPs include spyware, adware, and dialers.

Malware exploits security defects (security bugs, or vulnerabilities) in the design of the operating system, in applications (such as browsers—avoid using Internet Explorer 8 or earlier, e.g. on Windows XP), or in (old versions of) browser plugins such as Adobe Flash Player, Adobe Acrobat / Reader, or Java (see Java SE critical security issues). Sometimes even installing new versions of such plugins does not automatically uninstall old versions. Security advisories from such companies announce security-related updates.

Most systems contain bugs, or loopholes, which may be exploited by malware. A typical example is a buffer-overrun vulnerability, in which an interface designed to store data, in a small area of memory, allows the caller to supply more data than will fit. This extra data then overwrites the interface's own executable structure (past the end of the buffer and other data). In this manner, malware can force the system to execute malicious code, by replacing legitimate code with its own payload of instructions (or data values) copied into live memory, outside the buffer area.


Anti-malware strategies.


As malware attacks become more frequent, attention has begun to shift from viruses and spyware protection, to malware protection, and programs that have been specifically developed to combat malware. Other preventive and recovery measures, such as backup and recovery methods.

A specific component of the Anti virus and anti-malware software commonly referred as the on-access or real-time scanner, hooks deep into the operating system's core or kernel functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. 

Any time the operating system accesses a file, the on-access scanner checks if the file is a 'legitimate' file or not. If the file is considered a malware by the scanner, the access operation will be stopped, the file will be dealt by the scanner in pre-defined way (how the Anti-virus program was configured during/post installation) and the user will be notified. This may considerably slow down the operating system depending on how well the scanner was programmed. The goal is to stop any operations the malware may attempt on the system before they occur, including activities which might exploit bugs or trigger unexpected operating system behavior.

Anti-malware programs can combat malware in two ways:
  • They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.
  • Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.

Real-time protection from malware works identically to real-time antivirus protection: the software scans disk files at download time, and blocks the activity of components known to represent malware. In some cases, it may also intercept attempts to install start-up items or to modify browser settings. Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to "sandbox" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done.

Several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). A test has found a free program to be competitive with commercial competitors. Some viruses disable System Restore and other important Windows tools such as Task Manager and Command Prompt. Many such viruses can be removed by rebooting the computer, entering Windows safe mode with networking, and then using system tools or Microsoft Safety Scanner. 

Well after knowing what and how the dangers of malware attacks, now please you hunt a variety of programs to minimize the risk of getting malware. 
Broadly speaking, all the computer programs (including anti-malware / virus) is divided into 2 types: 
  • Programs that use should be installed computers. 
  • Programs that use does not need to be installed on the computer (portable). 
Here various latest computer security programs today (February 20, 2014) along with download links, all freeware, free to use in your home (not for business purposes).


Programs that use should be installed computers.

1. AntiVir Antivirus.


Avira AntiVir Personal - FREE Antivirus is a reliable free antivirus solution, that constantly and rapidly scans your computer for malicious programs such as viruses, Trojans, backdoor programs, hoaxes, worms, dialers etc. Monitors every action executed by the user or the operating system and reacts promptly when a malicious program is detected.

Avira Free AntiVirus protects you from viruses, Trojans, worms, spyware, adware, and various other kinds of malware, making it a fully functional antimalware tool and certainly one of the best free antivirus programs.

Avira Free AntiVirus (version 14) works on Windows 8, Windows 7, Windows Vista, and Windows XP. Avira also makes Avira Free for Linux.

The scope of malware that Avira Free AntiVirus can keep you safe from is alone enough to make it one of the best free antivirus software programs but the heuristics and ease of use add to its value too. The only things I didn't like about Avira Free AntiVirus was the configuration you have to complete after installation which might be intimidating if you're a computer novice.
  1. Detects and removes more than 150,000 viruses
  2. Always among the winners of comparison test featured in computer journals
  3. The resident Virus Guard serves to monitor file movements automatically, e.g. downloading of data from the internet
  4. Scanning and repair of macro viruses
  5. Protection against previously unknown macro viruses
  6. Protection against trojans, worms, backdoors, jokes and other harmful programs
  7. AntiVir protection against viruses, worms and Trojans
  8. AntiDialer protection against expensive dialers
  9. AntiRootkit protection against hidden rootkits
  10. AntiPhishing protection against phishing
  11. AntiSpyware protection against spyware and adware
  12. NetbookSupport for laptops with low resolution
  13. QuickRemoval eliminates viruses at the push of a button
  14. Easy operation
  15. Internet-Update Wizard for easy updating
  16. Protection against previously unknown boot record viruses and master boot record viruses
  • Title :   AntiVir  Personal  14.0.3.338
  • File  size :   130.70M B (137,044,488 bytes)
  • Requirements :   Windows  2000  /  XP  /  Vista  /  Windows7  /  XP64  / Vista64 / Windows7 64
  • License :   Non-Commercial  Freeware
  • Date  added :  February 19, 2014
  • Author :  A vi ra GmbH, www.avi ra.com
  • Homepage :  www.avira.com/en/avira-free-antivirus
Official  Link Download :


2. Avast!  Antivirus.


Avast! Free Antivirus is an efficient and comprehensive antivirus program. It is one of the most popular antivirus programs available, thanks to the reliable and trustworthy brand that Avast have created. The key features that continue to make Avast! Free Antivirus so popular are the easy UI, optimized scanning options and continuously updated database of virus definitions.

Simple, improved UI

The 2014 version includes a much simpler and quicker to use UI. Key features can be easily reached in the sidebar and the homepage is now customizable so you can access the tools you use most often directly. The overall appearance is clean and uncluttered, with buttons intuitively labelled and positioned.

Comprehensive Protection

Avast are constantly updating their database of virus definitions, meaning your computer will be protected against the latest spyware, viruses and potentially hazardous websites. Avast’s large and active community quickly alerts the development team of new security threats which are swiftly countered and added to Avast’s significant database. The browser add-on further improves computer security with features like cookie and social tracking blocking.

Speed

Avast! Free Antivirus comes with 5 standard scanning options based on depth and speed. Rapid scan will suffice in most cases - targeting removable media and the files you select, identifying security threats in usually less than a minute. A startup scan will launch automatically on boot up and is a useful, regular security check. The optimized scan engine in the 2014 version means scanning of text content is 10 times faster than previous versions. Scanning of EXE files is around 2 times faster. Improved memory usage means Avast! Free Antivirus should cause less strain on your system so you can continue with other tasks faster.

Summary

Avast! Free Antivirus is definitely one of the best free total security managers available. It is relatively lightweight and efficient, while still providing comprehensive security protection. The browser add on can slow browsing speed and the scanning might not be as detailed as some premium antivirus options. But the simple, effective UI and strong security capabilities make Avast! Free Antivirus a very good choice for those looking for free computer security.
  • Title :  Avast!  Free Antivirus 9.0.2013
  • File size :  86.38M B (90,578,216 bytes)
  • Requirements :   Windows  2000  /  XP  /  Vista  /  Windows7  /  XP64  /Vista64 / Windows7 64 / Windows8 / Windows8 64
  • License :  Non-Commercial  Freeware
  • Date added :  January 23, 2014
  • Author :  Avast Software  :  www.avast.com
  • Homepage :  www.avast.com/free-antivirus-download
Official  Link Download :


3. AVG Antivirus.


AntiVirus Free 2014 from AVG is one of the best free antivirus software tools available and is probably my personal favorite. AVG AntiVirus Free is a full-fledged antivirus and antispyware tool, includes an email scanner, link scanner, scheduled scanning options, automatic updates, and more. There is no need to pay for an antivirus program when one this good is just a download away.

The huge number of premium features, frequency of updating, and install-it-and-forget-it aspect of AVG's AntiVirus Free 2014 really do make it one of the best of the best free antivirus programs available today.

AVG Anti-Virus Free Edition is trusted antivirus and antispyware protection for Windows available to download for free. In addition, the new included LinkScanner® Active Surf-Shield checks web pages for threats at the only time that matters - when you're about to click that link.

AVG Anti-Virus Free has these following features:
  1. Award-winning antivirus and antispyware
  2. Real-time safe internet surfing and searching
  3. Quality proven by 80 million of users
  4. Easy to download, install and use
  5. Protection against viruses and spyware
  6. Compatible with Windows 7, Windows Vista and Windows XP
  • Title :  AVG Free Edition 2014.0.4335
  • File size :  136.60M B (143,231,560 bytes)
  • Requirements :   Windows  2000  /  XP  /  Vista  /  Windows7  /Windows8
  • License :  Freeware
  • Date added :  February 5, 2014
  • Author :  AVG Technologies  :  www.avg.com
  • Homepage :  free.grisoft.com/doc/avg-anti-virus-free/
Official  Link Download :
X -86

X -64


4. BitDefender Antivirus.


Bitdefender Antivirus Free Edition has been designed from ground up towards enabling you to do whatever you enjoy doing most with your computer, while staying 100% safe from e-threats.

Bitdefender uses its own proprietary technologies, while also improving on basic ones which it then integrates for maximum protection.

Features:
  1. Real-time Shield - The real time shield is designed to protect access to the entire system. This means that files are scanned as they are accessed or copied. For example, the files you just downloaded from the Internet are scanned immediately.
  2. Active Virus Control - Active Virus Control is an innovative proactive detection technology that is able to detect new potential threats for which default protection has not yet been released, very fast and accurately, thus providing an essential protection layer.
  3. Intrusion Detection System - This technology makes sure that applications trying to access the Internet or the network are not masked e-threats, by marking them whenever its behavior is suspect and by stopping them if the score becomes high.
  4. B-Have - B-HAVE proactively detects unknown threats that other products miss by analyzing applications behavior in a safe environment. If no malicious actions are detected, B-HAVE starts the program normally; otherwise, it will automatically quarantine or delete it.
  5. HTTP Scanning - Bitdefender Antivirus Free Edition also scans all the links you are accessing from your browser, checking them for various scams or credit card phishing attempts and blocking them when they are unsafe.
  6. Anti-rootkit - This technology is used to scan and block rootkits, a stealthy type of software, often malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer.
  • Title :  Bitdefender Antivirus Free Edition 1.0.21.1099
  • File size :  9.4M B
  • Requirements :  Windows XP / Vista / 7 / 7 64 bit / 8 / 8 64 bit
  • License :  Non-Commercial  Freeware
  • Date added :  October 26, 2013
  • Author :  Bi tdefender LLC
  • Homepage :  www. bi tdefender.com/

Official  Link Download :
X -86
X -64



5. Clam Win Antivirus.


ClamWin is a Free Antivirus program for Microsoft Windows 98/Me/2000/XP/2003 and Vista. ClamWin Free Antivirus comes with an easy installer and open source code. You may download and use it absolutely free of charge. It features:
  1. High detection rates for viruses and spyware;
  2. Scanning Scheduler;
  3. Automatic downloads of regularly updated Virus Database;
  4. Standalone virus scanner and right-click menu integration to Microsoft Windows Explorer;
  5. Addin to Microsoft Outlook to remove virus-infected attachments automatically.
Please note that ClamWin Free Antivirus does not include an on-access real-time scanner. You need to manually scan a file in order to detect a virus or spyware.
  • Title :  ClamWin 0.98.1
  • File size :  86.25M B (90,442,743 bytes)
  • Requirements :  Windows (All  V ersions)
  • License :  Open Source
  • Date added :  February 3, 2014
  • Author :  ClamWin  :  www.clamwin.com
  • Homepage :  www.clamwin.com
Link Download :



6. A-squared Malware Scanner.


Security must not be a privilege. Under this motto, Emsi Software provides the Malware scanner a-squared Free completely free of charge for private use. But it is not a very limited version, it is a full tool to clean your computer from Malware. Not only Spywares, as detected by classic Anti-Spyware programs, but also especially Trojans, Backdoors, Worms, Dialers, Keyloggers and a lot of other destructive pests, which makes it dangerous to surf the web.

Security must not be a privilege. Under this motto, Emsi Software provides the Malware scanner a-squared Free completely free of charge for private use. But it is not a very limited version, it is a full tool to clean your computer from Malware. Not only Spywares, as detected by classic Anti-Spyware programs, but also especially Trojans, Backdoors, Worms, Dialers, Keyloggers and a lot of other destructive pests, which makes it dangerous to surf the web.
The advantages to you:
  1. Frees your PC from Malware
  2. Quarantine for emergency
  3. Exceptionally easy to use
Note: As of July 2010, a-squared Free is no longer developed. Its feature-identical successor is Emsisoft Anti-Malware.
  • Title :  a-squared Free 4.5.0.27
  • File size :  82.40M B (86,402,920 bytes)
  • Requirements :   Windows  XP  /  Vista  /  Windows 7  /  XP 64  /  Vista64  /
  • Windows7 64 / Windows8 / Windows8 64
  • License :  Freeware
  • Date added :  April  22, 2010
  • Author :  Emsi  Software, www.emsisoft.com
  • Homepage :  www.emsisoft.com/en/software/free/
Link Download :


7. Panda Cloud Antivirus


Panda Cloud Antivirus Free 2 protects you from several kinds of malware threats - viruses, worms, Trojans, adware, and more - just like all the other free antivirus programs in this list.

What makes Panda Cloud Antivirus Free 2 one of the best free antivirus programs is that it does its job from "the cloud" meaning the hard antivirus work that typically slows down a computer is done on computers elsewhere on the Internet, freeing up your computer to work like it should and protecting you from malware even better.

Panda Cloud Antivirus Free tries to install a toolbar and change your browser's home page and default search provider during the installation process. Uncheck those boxes before continuing if you don't want them. None of those changes are required to use Panda Cloud Antivirus.
  • Title :  Cloud Antivirus 2.3.0
  • File size :  44.60M B (46,768,304 bytes)
  • Requirements :   Windows  XP  /  Vista  /  Windows7  /  Vista64  / Windows7 64 / Windows8 / Windows8 64
  • License :  Freeware
  • Date added :  October 30, 2013
  • Author :  Panda Security, www.pandasecurity.com
  • Homepage :  www.pandasecurity.com
Link Download :
http://fs35.filehippo.com/6189/3c79aa09738d4c66b9359fead3170e4a/CloudAntivirus.exe


Ranks of combat weapons I have mentioned above is a small portion of your computer's security guard program, there are many other options, please visit the program you have set as well as possible in order to protect your computer to the maximum.

Author : Yohanes Gitoyo.
Source : http://mypcdefender.blogspot.com/.

Komentar

Postingan populer dari blog ini

5 Alasan Mengapa "Wanita Cantik" Nikahi "Pria yang Kurang Menarik" ?

Mengenal Ludruk, Kesenian Khas Jawa Timur Yang Melegenda.

Inilah Kisah Lengkap Legenda Bharatayudha / Mahabharata.

Prosedur dan Persyaratan Pengajuan Kredit Bank.

Jika Naga Hidup di Dunia Nyata, Bagaimana Cara Mereka Semburkan Api?

20 Karakter Game Wanita Yang Cantik Dan Seksi Karya Computer-Generated Imagery (CGI).

Mengenal Rsi Byasa (IAS Vyāsa) Filsuf Kuno Terbesar di India, Penulis Kisah Mahabarata.

Menguak Rahasia Isi Ruangan Dalam Ka'bah, Bangunan Tersuci Umat Islam

Inilah : Satyrichthys welchi, Ikan Asal Aceh Yang Bentuknya Seperti Pesawat Tempur Siluman !

Kurukshetra : Inilah Lokasi Tempat Terjadinya Pertempuran Besar "Mahabharata" atau "Barata Yudha", Apa Kabarnya Sekarang ?