header



Welcome to the Micro Center Tech Support Blog!
Find free technical support on a variety of products featured at Micro Center and plenty of how-tos on new technology. Start searching our Blog below or search our Tech Center archives »

Can't find what your looking for? Take advantage of our Tech Support services »

Join the MC Tech Support Community Forum: Get direct advice from the Knowledge Experts @ Micro Center.
Click here to access the Forum »

Search This Blog

Showing posts with label spyware. Show all posts
Showing posts with label spyware. Show all posts

Monday, October 8, 2012

Tech Tip of the Day: How to download, install, and run SUPERAntiSpyware

Description: Are you concerned about possible spyware, adware, malware, or similar problems on your computer? Does your computer seem to run very slow? SUPERAntiSpyware is a utility that may help you to diagnose and repair these types of problems.

These days there can be a new virus or infection created every three seconds, and computer users need to be ready for the next attack that could be made on their systems. Along with routine Windows maintenance addressing concerns such as cleaning up temporary files or repairing registry errors, running multiple scans from AntiVirus and AntiMalware programs can help to take care of these problems. There is a program called SUPERAntiSpyware that scans your computer for infections, temporary files, registry errors and things like that in just one scan, and then makes recommendations for corrections to the system that it can make.

  1. To download the program, you can go directly to the program's website http://www.superantispyware.com - be sure to understand any terms and conditions of the program.
  2. Go ahead and download the installer, saving it to a location on your computer where you will be able to find it easily, and then run the installer as shown in the picture.

    download the installer
  3. Once finished, open the program and the user will be greeted with a home screen as shown here.

    home screen

  4. Just click "Scan your Computer" to get a full scan under way and let the program work for you.

    Scan your Computer

  5. Once finished, the scans will provide a result pop up as shown below. Click the continue button to delete the threats.

    continue

  6. Once the deletion process has completed, click the Finished button.

    Finished

  7. The program will then ask you to reboot or reboot later, it is best to save and close all programs then reboot your computer for the changes to go into effect.

    *In this and similar situations, it is important for the end user to understand that they are obtaining utility programs such as this one from known reputable sources. If you are unsure of the source being reputable, it can be possible for rogue programs to present themselves as solutions when, in fact, they are actually "problems in disguise" that will make things worse instead of better.
For more assistance contact Technical Support here.

Tuesday, May 15, 2012

Tech Tip of the Day: How to download, install and immunize your browser with Spybot

Description: This article will show you how to download, install and immunize your browser using Spybot. Spybot - Search & Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Spyware silently tracks your surfing behavior to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies.

If you see new toolbars in your Internet Explorer that you haven't intentionally installed, if your browser crashes inexplicably, or if your home page has been "hijacked" (or changed without your knowledge), your computer is most probably infected with spyware. Even if you don't see the symptoms, your computer may be infected, because more and more spyware is emerging. Spybot-S&D is free, so there's no harm giving it a try to see if something has invaded your computer.¹
  1. Open you browser and go to the SpyBot home page

    spybot homepage

  2. Click on the download link in the upper right corner.
  3. When the page loads click download

    download

  4. Select the mirror to download from

    mirror

  5. Click on the download link

    download

  6. Select ‘Run’ to start the download and install

    run

  7. Select language and click OK

    language

  8. Click on Next

    Next

  9. Accept the license agreement and click Next

    accept

  10. Select or change install location and click Next

    install location

  11. Select or deselect components and click Next

    components

  12. Select start menu folder location and click Next

    start menu

  13. Select Additional Tasks and click Next

    additional tasks

  14. Click on Install to begin installation

    Install

    installing

  15. Select Finish when install is complete

    finish

    loading

  16. Click on Create Registry Backup
    • When completed, click Next

    create registry backup

  17. Select "Start Using The Program"

    start using program

  18.  Click on Immunize to immunize your browser.

    Immunize

  19. When Immunization scan is completed and unprotected lists zero, close program.

    finish
For more assistance contact Technical Support here.

¹cited from http://www.safer-networking.org

Tuesday, April 24, 2012

Tech Tip of the Day: How to use a HOSTS File to proactively defend your Windows computer against most known Malware programs

Description: This article describes the processes of installing and updating a 3rd party HOSTS file to provide a strong layer of defense against most known forms of malware, immunizing your system from many malicious programs before they become a threat.

Background: The HOSTS file is a File used by the Windows operating system to map the location of computers or web addresses on its network. It is similar in function to the Domain Name System (DNS) which maps server Internet Protocol (IP) addresses to domain names, such as ‘google.com’ (Google’s Top-Level Domain [TLD]), which directs internet traffic to the IP address of one of Google’s servers, such as ‘72.14.204.105’. As such, it is important to be very careful when making any changes to this system. Fortunately, there are several reputable groups which actively maintain and test custom HOSTS file configurations which are freely available on the internet today.

This guide will cover the installation process for two popular HOSTS files which are regularly tested and are considered safe to use. It is important to choose only one guide to follow, as attempting to install multiple HOSTS files can lead to conflicts.

Note: If you are attempting to follow this guide on a computer connected to a home or work network, please contact your Network Administrator before continuing, as making changes to the HOSTS file may affect network connectivity in certain situations.

  1. MVPS HOSTS
    • Download ‘hosts.zip’ from the following web page:
      http://winhelp2002.mvps.org/hosts.htm

      hosts.zip
    • Extract the contents of the ‘hosts.zip’ file by Right Clicking on the file from within Windows Explorer and selecting the ‘Extract All’ option from the menu.

      extract all
    • Right click on ‘mvps.bat’ and select the ‘Run as Administrator’ option from the menu.
      • Click ‘Continue’ in the User Account Control (UAC) prompt, if one appears.
      • In Windows XP, or if the ‘Run as Administrator’ option is not available, you may simply Double-Click on ‘mvps.bat’ or Right Click on the file and select ‘Open’ from the menu.

        Run as admin
    • Press Any Key when prompted.
      • The window background should turn Blue and display a message stating
        "THE MVPS HOSTS FILE IS NOW UPDATED", signifying that the process has completed successfully.

        completed
    • Restart Your Computer to complete the installation.

  2. Spybot - Search & Destroy
    • Download Spybot-S&D from one of the Mirror Sites listed at this link:
      http://www.safer-networking.org/en/mirrors/index.html

      Download Spybot
    • Double-Click on the .exe file you just downloaded (the file should be named ‘spybotsd162.exe’ or something similar) and follow the Installation Wizard to install the program.

      Installation Wizard
    • Start Spybot-S&D by Double-Clicking on the Icon on your desktop or from the Start Menu by clicking on the Start Button in the lower left corner of your screen and going to ‘All Programs’ » ‘Spybot - Search & Destroy’ and Clicking on the ‘Spybot - Search & Destroy’ Link from the list.

      Search and Destroy

      • The First time you run the program, you may be presented with an Initial Setup Wizard window. Click ‘Next’ on this window and follow the steps to complete the initial setup and updating of the program.

        Next
    • On the Main ‘Spybot - Search & Destroy’ window, click the ‘Immunize’ option from the Menu Bar on the Left.

      Spybot

      • The program will run a quick scan to check the current protection status of your computer.
    • Click the ‘Immunize’ button to begin the immunization process.
      • This may take some time depending on the specifications of your computer.

        Immunize
    • Restart your computer to complete the installation.
For more assistance contact Technical Support here.

Wednesday, December 21, 2011

Computer Viruses and How to Avoid Them

What is the difference between "malware" and a virus?


Malware is shorthand for "malicious software" and is used to describe an entire group of programs that includes advertising, tracking, key-logging, ID or credit theft or that cause other bad or undesirable activity. Simply explained, a "virus" is a computer program that invades or infects a user's computer by replication from another source (a disk, a USB flash drive, a network or the Internet), and then performs malicious functions on the new host computer. It's the malicious functionality that poses the problem, and for that reason viruses could be also called "malware."

 

A virus is just one type of Malware.
A virus is just one type of Malware.


There are many different undesirable things that computer malware does. Earlier viruses simply performed mischievous tasks, such as deleting data or program files. But the authors of newer malware are driven by the desire to steal enough sensitive data in order to eventually steal money. Some are thus designed to scan and send information from a victim’s computer back to the author of the malware. Still others keep track of actual keystrokes typed by an unsuspecting user. Some plant annoying "popup" advertisements on a computer. There are a few types of malware that will perform any of the above, but also attach themselves to email addresses so that they get automatically sent to the user’s address list to replicate on an ever growing number of systems. Sophisticated malware might even install itself on the hidden "boot sector" of a computer hard drive, or try to make a network server vulnerable to a hacker (a person who gains unauthorized access to a computer network). But, the most common type of malware, by far, is the malicious program that deceitfully disguises itself as a good or useful program, seeking to get results which the user did not intend.

The fact is that malware has caused billions of dollars in losses to computer users. People have lost valuable data and have had personal and financial identities stolen. Whole companies have been compromised or crippled by malware infections. At the very least, the average user suffers from the slowdown or complete hijacking of their system through a malware infection. It is therefore imperative for computer users to know some basics about viruses, or "malware," in order to protect themselves.

Types of malware

  1. Virus - The original malware. Malicious code attaches itself to other program files so that the execution of the host file also executes the malicious code. The malicious code also causes the virus to replicate itself by copying its code onto removable media or other computers in a network. Back in the 1980s, the first "in the wild" viruses spread themselves mostly through shared floppy disks, and performed everything from pranks to data destruction. By the 1990s, Internet "bulletin boards" were unwitting spreaders of viruses. Today, very little malware is of the virus type.
  2. Trojan - These comprise 75% or more of all malware, according to security experts. As the name from classical Greek mythology suggests, Trojans operate by deceit, tricking a computer user to trust a fraudulent program. Most Trojans are actually a complex of files - pop-ups that steer the unsuspecting user to a harmful website, or just install more malware, even when clicked to shut down; downloaders that bring in supporting malware programs; hijackers that shut down operating system functions and security; bots that may use the host computer as a slave to the malware author’s intentions; backdoors that make an infected computer open to free scanning by the malware author. Trojans operate independently of other programs, and thus do not need to attach themselves to other executable files as a classic virus does. The most popular Trojans, these days, masquerade ironically as anti-virus programs. The user experiences sudden low computer performance, and then sees a pop-up offer with a phony virus scan report, urging the user to purchase the program offered as a solution to the computer problems they are experiencing. Naive and unsuspecting users then type personal information into the form provided (including name, address and credit card info). This information is never used to purchase the phony software. Rather, the Trojan authors use the stolen info to open new credit card accounts in the user’s name, and then sell those accounts on the underground market within minutes of receiving it.
  3. Worm - A Trojan that has the capacity to infect computers from other infected systems by scanning for IP addresses on vulnerable computers on the Internet or within a network, then replicating itself. Many phony anti-virus programs start out as a worm infection. Worms are also notorious for attaching themselves to email address lists. Users falsely believe that Trojan infections come mostly from certain "dangerous" or risky websites. In truth, worms may employ any website that users visit as stepping stones to their computers.
  4. Spyware - Software programs that "spy" on users, observing data, keystrokes, screens and/or web sites visited. This is a broad category of malware and includes everything from adware to keyloggers (see below). Unlike viruses, Trojans and worms, spyware typically does not self-replicate by infecting other computers or removable media, but is downloaded through Internet connections.
  5. Keylogger - A particular type of spyware that is designed to steal "live" information. It secretly keeps track of such things as the user’s keyboard keystrokes, video screens, or streaming network data, and transmits that information back to the malware author. This malware attack is more rare, but it poses the serious risk of loss of private identity information, including credit cards, bank account info, Social Security numbers, and computer passwords.
  6. Rootkit - A stealth program that allows continual unauthorized access to a computer by a person unknown to the user. This malware replicates itself on a victim’s computer usually as a worm or a Trojan. It quickly shuts down user account controls and security designed to prevent unauthorized access. It can then steal and transmit info or simply provide a "back door" for a hacker. Rootkits are usually quite sophisticated, and often include the ability to deflect detection from weaker and more modest anti-virus programs.
  7. Phishing - Typically an email message that is "fishing" for personal information. The victim receives a randomly sent message that appears to be an official request from an Internet service provider, a bank or some other service or organization. The graphics in the message typically look professional and authentic, though the grammar in the message is sometimes suspiciously bad. An appeal is made to the user to provide "lost" information. However, NO organization or bank will ever seek information this way. Such fraud should always be reported to the organization or service that is being used as a cover.
  8. Adware - The most benign of all types of malware, it can still annoy users with commercially-charged pop-ups and reduced system performance. Adware often gets installed without user’s consent, and often when downloading program updates, trial software and games or other services. Some adware functions as spyware by tracking the user’s favorite web sites and targeting the user with advertising that is likely to be the most appealing. Adware can hijack web-search functions. The most common form of adware is the browser "toolbar," which ostensibly provides services such as search windows and quick-access icons. These toolbars slow computer and Internet performance, take screen space from web pages, and can even be a conduit for more serious malware.
    Prevent and cure  
    Prevent and cure

How to Prevent Malware Infections

The best way to be free of malware infections is to take preventative measures rather than relying upon removal after infection. Once infected, a computer is often very difficult to clean. Some malware will destroy a computer’s operating system, or make it so difficult to recover that wiping the hard drive and reinstalling the operating system, programs and data is the only solution. This is usually quite a chore, may be expensive if the user does not have the technical know-how and may be personally costly if the user’s own data has not been previously backed up. There are several preventive measures that every computer user can take:
  1. Utilize a good anti-virus program. There is no substitute for this measure. Avoid the seduction of free anti-virus programs and the ones that come with Internet service providers, as they only do a mediocre job of prevention. A $40 to $50 investment in a good anti-virus program with an annual license to update itself regularly is pretty inexpensive insurance.
  2. Manually scan your computer with an anti-virus program. All good anti-virus programs come with manual scanning features. Most will let you set a schedule for automatic scanning. This is good to do once a week, or every month, and especially if you see any suspicious activity on the computer screen.
  3. Update key programs every time. The Ziff-Davis network cited a study done in Denmark earlier in 2011 utilizing results from half a million computers. The conclusion of the study was that some 99% of common malware infections could be avoided simply by updating Windows security patches, Internet Explorer, Java, Adobe Flash and Adobe Reader. The reason? Malware authors attempt to gain access to computers through weaknesses which the updates are written to prevent.
    (See: ZDNet - The Ed Bott Report, Oct 7, 2011. Summary: Want to avoid being attacked by viruses and other malware? Two recent studies reveal the secret: regular patching. A fully patched system with a firewall enabled offers almost complete protection against drive-by attacks and outside intruders.
    www.zdnet.com/blog/bott/if-your-pc-picks-up-a-virus-whose-fault-is-it/4039)
  4. Use a hardware firewall. The SPI (Stateful Packet Inspection) firewalls that come with most newer routers is a great way to close unused ports and prevent hackers from intrusion. Even single computer homes and offices can benefit greatly from the use of a router. While utilizing a router’s hardware firewall, you may also use your operating system’s software firewall. Beware of using third-party software firewalls (such as those included with anti-virus software) which serve to slow down a computer. If you’re using a wireless router, make sure to encrypt your network with WPA or WPA2 level encryption, never the older and simpler WEP encryption.
  5. Uninstall browser toolbars. Toolbars are the quarter-inch wide strips that layer near the top of a web browser. While some toolbars may be useful on a limited basis, they all steal screen space and clog up your Internet bandwidth only to provide revenue for the author. By definition, toolbars communicate with their authors, thus opening a vulnerability "hole" while the PC user is online. Utilizing the add/remove function in Windows machines is the best way to rid a computer of these browser plugins. Some of the most common toolbars include: AIM, AOL, Ask, Bing, Crawler, Dogpile, eBay, Google, My Way, My Search, My Web Search, Yahoo, etc.
  6. Regularly delete browser cookies and "Temporary Internet Files." This is performed from within the browsers, themselves. Malware can hide amongst these files.
  7. Do not click on pop-ups - shut them down alternatively. If you DO get a suspicious pop-up window, try using the "Alt-F4" combination to get rid of it rather than clicking on it and risking an unintended installation of a virus. If that combination does not work to close a window, use the Microsoft Windows "Task Manager" ("Ctrl-Shift-Esc") and the "Applications" tab. Simply click once on the listed application and then click the "End Task" button. After a forced-close, some browsers will attempt to recover the last page you were on the next time you restart. Select "No" or have it go to your Home Page instead.
  8. Use an Anti-Malware application and keep it updated. While Anti-Virus applications will detect and block viruses, worms, and other programs that spread by design, they do not always detect or block programs that you allow to install on the computer. Clicking on pop-up advertising windows, opening, email or Instant messaging attachments, or downloading and installing games or other programs can trigger the installation of an undesirable application. Using a program to scan your computer periodically for programs your antivirus may miss is recommended. Programs like MalewareBytes, Spy Sweeper, or SuperAntiSpyware may catch and remove malware.

Security and Urban Legends

While it is important to be informed about the facts regarding malware, methods of infection, and methods of prevention, it is also just as important to know that there are some common public beliefs that are just not true. Here are some common "urban legends" that are patently false:
  1. Anti-virus software companies conspire to write viruses so they can stay in business. Many computer users are tempted to believe this falsehood, but only because they do not understand how lucrative the criminal activity of malware authoring has become. If legitimate software companies were the actual criminals, someone would have blown the whistle years ago. The actual malware criminals enjoy both anonymity (they attack unseen from anywhere in the world) and impunity (there are limited resources and jurisdiction for prosecuting them, even when observed).
  2. Viruses come mostly from questionable web sites. Computer users also typically believe that infections are the result of using social, illegal downloading or pornographic web sites. However, the fact is that malware infections such as worms and Trojans can attack from anywhere, and may use any legitimate and otherwise well-guarded web site as a stepping stone from one infected PC to another.
  3. Free anti-virus programs are just as good as the paid-for programs. This is demonstrably not true. Observe the results of serious testing labs. If ever there were a good application of the "you-get-what-you-pay-for" principle, it would apply with anti-virus programs. Simply put, you pay for regular and effective program and virus definition updates. Licensed programs are anxious to push out good updates - often daily - to their customers. They want our business year after year, and therefore work hard to distribute good products, and largely succeed at it.
    (See: AV Comparatives - Independent Tests of Anti-Virus Software. www.av-comparatives.org)

Summary

Don’t let the threat of malware infections stop you from using the rich resources of computing. Just use your computer wisely. Utilize the measures outlined above. And exercise a healthy dose of suspicion about what you see on your computer screen, short of being paranoid. There is no reason why the careful computer user cannot buy things with a credit card, do banking and investments, and send critical business data over the Internet If possible, encrypt the data you are sending or utilize a VPN (Virtual Private Network). Certainly, you should never carry out financial transactions over a public wireless network. In spite of the risks - which are present primarily in the midst of carelessness - computers provide a powerful tool for use both on and off the Internet

For more assistance contact Technical Support here.

Friday, November 11, 2011

How to Use a HOSTS File to Proactively Defend Your Windows Computer against Most Known Malware Programs

Description: This article describes the processes of installing and updating a 3rd party HOSTS file to provide a strong layer of defense against most known forms of malware, immunizing your system from many malicious programs before they become a threat.

Background: The HOSTS file is a File used by the Windows operating system to map the location of computers or web addresses on its network. It is similar in function to the Domain Name System (DNS) which maps server Internet Protocol (IP) addresses to domain names, such as ‘google.com’ (Google’s Top-Level Domain [TLD]), which directs internet traffic to the IP address of one of Google’s servers, such as ‘72.14.204.105’. As such, it is important to be very careful when making any changes to this system. Fortunately, there are several reputable groups which actively maintain and test custom HOSTS file configurations which are freely available on the internet today.

This guide will cover the installation process for two popular HOSTS files which are regularly tested and are considered safe to use. It is important to choose only one guide to follow, as attempting to install multiple HOSTS files can lead to conflicts.

Note: If you are attempting to follow this guide on a computer connected to a home or work network, please contact your Network Administrator before continuing, as making changes to the HOSTS file may affect network connectivity in certain situations.
  1. MVPS HOSTS
    • Download ‘hosts.zip’ from the following web page: http://winhelp2002.mvps.org/hosts.htm

      hosts.zip

    • Extract the contents of the ‘hosts.zip’ file by Right Clicking on the file from within Windows Explorer and selecting the ‘Extract All’ option from the menu.

      extract all

    • Right click on ‘mvps.bat’ and select the ‘Run as Administrator’ option from the menu.
      • Click ‘Continue’ in the User Account Control (UAC) prompt, if one appears.
      • In Windows XP, or if the ‘Run as Administrator’ option is not available, you may simply Double-Click on ‘mvps.bat’ or Right Click on the file and select ‘Open’ from the menu.

        Run as admin

    • Press Any Key when prompted.
      • The window background should turn Blue and display a message stating "THE MVPS HOSTS FILE IS NOW UPDATED", signifying that the process has completed successfully.

        completed

    • Restart Your Computer to complete the installation.

  2. Spybot - Search & Destroy
    • Download Spybot-S&D from one of the Mirror Sites listed at this link: http://www.safer-networking.org/en/mirrors/index.html

      Download Spybot

    • Double-Click on the .exe file you just downloaded (the file should be named ‘spybotsd162.exe’ or something similar) and follow the Installation Wizard to install the program.

      Installation Wizard

    • Start Spybot-S&D by Double-Clicking on the Icon on your Desktop or from the Start Menu by Clicking on the Start Button in the Lower Left corner of your screen and going to ‘All Programs’ » ‘Spybot - Search & Destroy’ and Clicking on the ‘Spybot - Search & Destroy’ Link from the list.

      Search and Destroy

      • The First time you run the program, you may be presented with an Initial Setup Wizard window. Click ‘Next’ on this window and follow the steps to complete the initial setup and updating of the program.

        Next

    • On the Main ‘Spybot - Search & Destroy’ window, Click the ‘Immunize’ option from the Menu Bar on the Left.

      Spybot

      • The program will run a quick scan to check the current protection status of your computer.
    • Click the ‘Immunize’ button to begin the immunization process.
      • This may take some time depending on the specifications of your computer.

        Immunize

    • Restart Your Computer to complete the installation.
For more assistance contact Technical Support here.

Thursday, February 24, 2011

How to run an ESET Scan in Safe Mode

This guide will show you how to run an ESET NOD32 or ESET Smart Security scan in Safe Mode. This is useful when you have a virus that ESET is not able to remove in Windows normal mode. It is recommended that you print this guide as the computer will be running in safe mode and the guide will not be accessible through the Internet.

  1. Print this document and keep it available as it will be needed and it will not be accessible via the Internet for the duration of this guide.
  2. Turn the computer all the way off. Do not restart the computer, leave it powered off.
  3. Locate the F8 key along the top row of the keyboard.
  4. Power on the computer and immediately start tapping the F8 key repeatedly about once per second. The Windows Advanced Boot Options menu will be displayed.
  5. On the Windows Advanced Boot Options menu, use the arrow keys on the keyboard to select “Safe Mode” and press Enter.
    Note: The mouse will not work on this screen.
  6. If prompted to "Choose an Operating System", press Enter on the default selection.
  7. When the login screen appears, choose an account with Administrative Privileges. If you are not sure, choose the account that is normally used.
    - The colors will appear differently and the size may be different. This is normal for Safe Mode.
  8. If using Windows XP, a screen with a Yes or No option may appear. Click Yes on that screen.
    If using Windows Vista or Windows 7, a screen titled “What Is Safe Mode” may appear. Close that screen, it is not relevant for this purpose.
  9. Click on the Start button in the bottom left, and choose All Programs.

  10. On the All Programs menu, select the ESET folder, and then ESET NOD32 or ESET Smart Security depending on the installed version.

  11. The ESET NOD32 AntivirusSafe Mode window will appear and prompt for a Yes or No answer. Click on the Yes button to being the scan.

  12. The ESET Scan will begin.


    It is normal for the ESET program to be denied access to certain system files.
  13. The ESET scanner may scroll through many lines of information. Once it is finished, it will display a status message inside this window. Reboot the computer to get back in to Windows normal mode.