Wednesday, 23 April 2014

How to prevent and remove viruses and other malware

Microsoft ended support for Windows XP on April 8, 2014

Support for Windows XP has ended

for more info and update visit Computer Doctor

Microsoft ended support for Windows XP on April 8, 2014. This change has affected your software updates and security options.
Learn what this means for you and how to stay protected.
Article ID: 129972 - View products that this article applies to.
This article was previously published under Q129972
 What is a computer virus?
A computer virus is a small software program that spreads from one computer to another and interferes with computer operation. A computer virus might corrupt or delete data on a computer, use an email program to spread the virus to other computers, or even delete everything on the hard disk.

Computer viruses are frequently spread by attachments in email messages or by instant messaging messages. Therefore, you must never open an email attachment unless you know who sent the message or you are expecting the email attachment. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread through downloads on the Internet. They can be hidden in pirated software or in other files or programs that you might download.

Symptoms of a computer virus
For information about the symptoms of a computer virus, go to the
Microsoft PC Security website.

What is a worm?
A worm is computer code that spreads without user interaction. Most worms begin as email attachments that infect a computer when they're opened. The worm scans the infected computer for files, such as address books or temporary webpages, that contain email addresses. The worm uses the addresses to send infected email messages, and frequently mimics (or spoofs) the "From" addresses in later email messages so that those infected messages seem to be from someone you know. Worms then spread automatically through email messages, networks, or operating system vulnerabilities, frequently overwhelming those systems before the cause is known. Worms aren't always destructive to computers, but they usually cause computer and network performance and stability problems.

What is a trojan horse?
A trojan horse is a malicious software program that hides inside other programs. It enters a computer hidden inside a legitimate program, such as a screen saver. Then it puts code into the operating system that enables a hacker to access the infected computer. Trojan horses do not usually spread by themselves. They are spread by viruses, worms, or downloaded software.

What is spyware?
Spyware can install on your computer without your knowledge. These programs can change your computer’s configuration or collect advertising data and personal information. Spyware can track Internet search habits and can also redirect your web browser to a different website than you intend to go to.

What is rogue security software?
A rogue security software program tries to make you think that your computer is infected by a virus and usually prompts you to download or buy a product that removes the virus. The names of these products frequently contain words like Antivirus, Shield, Security, Protection, or Fixer. This makes them sound legitimate. They frequently run right after you download them, or the next time that your computer starts. Rogue security software can prevent applications, such as Internet Explorer, from opening. Rogue security software might also display legitimate and important Windows files as infections. Typical error messages or pop-up messages might contain the following phrases:

Warning!
Your computer is infected!
This computer is infected by spyware and adware.

Note If you receive a message in a popup dialog box that resembles this warning, press ALT + F4 on your keyboard to close the dialog box. Do not click anything inside the dialog box. If a warning, such as the one here, keeps appearing when you try to close the dialog box, it’s a good indication that the message is malicious.

Are you sure you want to navigate from this page?
Your computer is infected! They can cause data lost and file corruption and need to be treated as soon as possible. Press CANCEL to prevent it. Return to System Security and download it to secure your PC.
Press OK to Continue or Cancel to stay on the current page.

If you see this kind of message, then don't download or buy the software.

What is malware?
Malware is a term that is used for malicious software that is designed to do damage or unwanted actions to a computer system. Examples of malware include the following:
  • Viruses
  • Worms
  • Trojan horses
  • Spyware
  • Rogue security software

How to remove malware such as a virus, spyware, or rogue security software
Removing a computer virus or spyware can be difficult without the help of malicious software removal tools. Some computer viruses and other unwanted software reinstall themselves after the viruses and spyware are detected and removed. Fortunately, by updating the computer and by using malicious software removal tools, you can help permanently remove unwanted software.

For more information about how to remove a computer virus and spyware, see the following article in the Microsoft Knowledge Base:
2671662 - Microsoft resources and guidance for removal of malware and viruses
Note If you cannot access the Internet on your computer, use another computer to help you follow the steps in the “How to reset your Internet Explorer proxy settings” section on the computer that may be infected.

To remove a computer virus and other malicious software, follow these steps in order.

Install the latest updates from Microsoft Update
Note A computer virus may prevent you from accessing the Microsoft Update website to install the latest updates. We recommend that you set the Automatic Updates service to run automatically so that a computer is not missing any important updates. For more information, see the following article in the Microsoft Knowledge Base:
Windows Vista and Windows 7
assets folding start collapsed
  1. Click Start, and then type Windows Update in the search box.
  2. In the results area, click Windows Update.
  3. Click Check for Updates.
  4. Follow the instructions to download and install the latest Windows Updates.
assets folding end collapsed
Windows XP
assets folding start collapsed


  1. Click Start, and then click Run.
  2. Type sysdm.cpl, and then press Enter.
  3. Click the Automatic Updates tab, and then click the Automatic (recommended) option.
  4. Click OK.
assets folding end collapsed


Use the free Microsoft Safety Scanner
Microsoft offers a free online tool that scans and helps remove potential threats from your computer. To perform the scan, go to the Microsoft Safety Scanner website.

Use the Windows Malicious Software Removal Tool
For more information about the Microsoft Malicious Software Removal Tool, see the following article in the Microsoft Knowledge Base:
890830 - The Microsoft Windows Malicious Software Removal Tool helps remove specific, prevalent malicious software from computers that are running Windows 7, Windows Vista, Windows Server 2003, Windows Server 2008, or Windows XP

Manually remove the rogue security software
If the rogue security software can’t be detected or removed by using Microsoft Safety Scanner or the Windows Malicious Software Removal Tool, try the following steps:
Windows XP, Windows Vista, or Windows 7
assets folding start collapsed

  1. Note the name of the rogue security software. For this example, we'll call it XP Security Agent 2010.
  2. Restart your computer.
  3. When you see the computer's manufacturer's logo, repeatedly press the F8 key.
  4. When you are prompted, use the arrow keys to highlight Safe Mode with Networking, and then press Enter.
  5. Click the Start button and check whether the rogue security software appears on the Start menu. If it's not listed there, click All Programs and scroll to find the rogue security software's name.
  6. Right-click the name of the rogue security software program, and then click Properties.
  7. Click the Shortcut tab.
  8. In the Properties dialog box, check the path of the rogue security software program that is listed in Target. For example, C:\Program Files\XP Security Agent 2010.

    Note The folder name frequently is a random number.
  9. Click Open File Location.
  10. In the Program Files window, click Program Files in the address bar.
  11. Scroll until you find the rogue security software program folder. For example, XP Security Agent 2010.
  12. Right-click the folder, and then click Delete.
  13. Restart your computer.
  14. Go to the Microsoft Safety Scanner website.
  15. Click the Download Now button, and then click Run.
  16. Follow the instructions to scan your computer and help remove the rogue security software.
assets folding end collapsed

If you suspect that your computer is infected with rogue security software that was not detected by using Microsoft security solutions, you can submit samples by using the Microsoft Malware Protection Center submission form.

For more information about rogue security software, go to the Watch out for fake virus alerts website.

Install and run Microsoft Security Essentials or Windows Defender

Windows XP, Windows Vista, or Windows 7
assets folding start collapsed


Microsoft offers a free malicious removal program called Microsoft Security Essentials that helps protect your computer from becoming infected. To install Microsoft Security Essentials, follow these steps:
  1. Go to the Microsoft Security Essentials website.
  2. Click Free Download.
  3. Click Run, and then follow the instructions to install Microsoft Security Essentials.
  4. After installation, restart your computer.
  5. Click Start, click All Programs, and then click Microsoft Security Essentials.
  6. On the Home tab, select the Full scan option, and then click Scan now.

Install Windows Defender Offline

Windows Defender Offline is a malware tool that helps remove difficult to eliminate viruses that start before Windows starts. To use Windows Defender Offline, follow these steps:
  1. On an uninfected computer, go to the What is Windows Defender Offline website.
  2. Click Download the 32 bit version or Download the 64 bit version, depending on which operating system that you are running. If you're unsure of which operating system that you are running, go to the Is my PC running the 32-bit or 64-bit version of Windows website.
  3. When you are prompted, click Save As, and then save the file to a DVD, CD, or USB flash drive.
  4. On the infected computer, insert the DVD, CD, or USB flash drive, and then restart the computer.
  5. When you are prompted, press a key to select an option to use to start your computer, such as F12, F5, or F8, depending on the kind of computer that you are using.
  6. Use the arrow key to scroll to the drive where you installed Windows Defender Offline file. Windows Defender Offline starts and immediately scans for malware.
For more information about how to remove a computer virus, go to the How do I remove a computer virus website.
assets folding end collapsed


How to protect your computer against malware


There are actions that you can take to help protect your computer against malware.

Turn on the firewall

Windows XP
assets folding start collapsed
Fix it for me
To turn on the firewall automatically, click the Fix this problem link. Then click Run in the File Download dialog box, and follow the steps in this wizard.
assets fixit1
Fix this problem
Microsoft Fix it Microsoft Fix it 50102
assets fixit2


Note This wizard may be in English only; however, the automatic fix also works for other language versions of Windows.

Note If you are not on the computer that has the problem, you can save the automatic fix to a flash drive or to a CD, and then you can run it on the computer that has the problem.

Let me fix it myself
To enable Windows Firewall, follow these steps:
  1. Click Start, click Run, type Firewall.cpl, and then click OK.
  2. On the General tab, click On (recommended).
  3. Click OK.
Note If the General tab or the On (recommended) option is unavailable, the system may have a policy against running the firewall. Contact the system administrator for more information about how to enable the firewall. In addition, the system may already be running a third-party firewall (Zone Alarm or Norton Internet Security, for example). Contact the system administrator for help in determining whether a firewall is already running on the system.

For more information about how to turn on your firewall in Windows XP, see the following article in the Microsoft Knowledge Base: 283673 - How can I turn on or turn off the firewall in Windows XP Service Pack 2 or later versions?

assets folding end collapsed
Windows Vista and Windows 7
assets folding start collapsed
  1. Click the Start button, and then click Control Panel.
  2. In the Search box, type firewall, and then click Windows Firewall.
  3. In the left pane, click Turn Windows Firewall on or off (you may be prompted to enter your administrator password).
  4. Under each network location, click On (recommended) (Windows Vista) or Turn on Windows Firewall (Windows 7), and then click OK.
For more information about how to turn on your firewall in Windows Vista, go to the Turn Windows Vista Firewall on or off website.
For more information about how to turn on your firewall in Windows 7, go to the Turn Windows 7 Firewall on or off website.

assets folding end collapsed

Keep your computer up to date
For more information about how to set Automatic Updates in Windows, see the following article in the Microsoft Knowledge Base:
306525 - How to configure and use Automatic Updates in Windows

Install Microsoft Security Essentials and keep it up to date
For more information about how to install and use Microsoft Security Essentials, go to the Microsoft Security Essentials website.

Don’t be tricked into downloading malware
Here are some tips that can help protect you from downloading software that you don't want:
  • Only download programs from websites that you trust. If you're not sure whether to trust a program that you want to download, enter the name of the program into your favorite search engine to see whether anyone else has reported that it contains spyware.
  • Read all security warnings, license agreements, and privacy statements that are associated with any software that you download.
  • Never click "Agree" or "OK" to close a window that you suspect might be spyware. Instead, click the red "x" in the corner of the window or press Alt + F4 on your keyboard to close a window.
  • Be wary of popular "free" music and movie file-sharing programs, and make sure that you understand all the software packaged with those programs.
  • Use a standard user account instead of an administrator account. For more information, go to the Why use a standard account instead of an administrator account website.
For more information about how to protect a computer against viruses, go to the How to boost your malware defense and protect your PC website.

How to reset your Internet Explorer proxy settings
Malicious software might change Internet Explorer proxy settings, and these changes can prevent you from accessing Windows Update or any Microsoft Security sites.

To have us change your Internet Explorer proxy settings for you, click the Fix it button or link. Click Run in the File Download dialog box, and follow the steps in the Fix it wizard: 
assets fixit1
Fix this problem
Microsoft Fix it Microsoft Fix it 50566
assets fixit2


Notes
  • This wizard may be in English only. However, the automatic fix also works for other language versions of Windows.
  • If you are not using the computer that has the problem, save the Fix it solution to a flash drive or a CD and then run it on the computer that has the problem.

To change your Internet Explorer proxy settings yourself, follow these steps:

Windows XP, Windows Vista, and Windows 7
  1. Click the Start button, and then click Run.
  2. In the Run box, copy and paste the following:
    reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyEnable /t REG_DWORD /d 0 /f
  3. Click OK.
  4. Click the Start button, and then click Run.
  5. In the Run box, copy and paste the following:
    reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyServer /f
  6. Click OK.
For more information about how to reset your Internet Explorer proxy settings, visit the following Microsoft Knowledge Base article:

2289942 - How to reset your Internet Explorer proxy settings

How to obtain computer virus and security-related support

For United States
Want to chat with a live person? Our Answer Tech trained professionals are ready to help:
Answer Desk

For United States and Canada Help protect your computer from viruses and malware:
Virus Solution and Security Center

Get help with installing updates:
Support for Microsoft Update

Security solutions for IT Professionals:
TechNet Security Troubleshooting and Support

Support by country:
International Support

If you are using a PC running Windows 8, click here for more information about how to help protect your PC from viruses, or click here for more information about how to find and remove viruses.

For locations outside North America
For computer virus and security-related support for locations outside North America, go to the Microsoft Support website.

Saturday, 19 April 2014

WINDOW XP AT RISK

Windows XP use declining, but millions still willingly at risk


Many users finally migrated off of Windows XP in the weeks leading up to the expiration of support, but millions of XP systems are still in use by businesses and consumers.
Windows XP
A week has gone by since the expiration of Windows XP support from Microsoft, and the internet has not yet imploded. That's awesome, but don't get too excited -- it's really just a matter of time. The simple reality is that the risk to Windows XP systems -- as well as the risk XP systems pose to the rest of the internet -- will only continue to grow with each passing week.
The good news is that many users apparently paid attention and heeded the avalanche of warnings from Microsoft and security experts to finally migrate off of Windows XP. According to Qualys CTO Wolfgang Kandek, Qualys tracked a marked decline in Windows XP use among its customers as we approached April 8.
General worldwide estimates still put Windows XP at nearly 30% of the overall desktop operating system market as of the end of March, but Qualys found usage to be around 10% for enterprise and consumer customers. As Kandek notes in the blog post, Qualys users are assumedly more security conscious than average, so the Qualys metrics are good news but possibly not indicative of any broader trend.
Based on how Windows XP has trended since May of 2013 on Net Market Share, it could take another two years or more before the operating system is completely extinct. That is a long time for businesses and consumers to rely on an insecure operating system.
The sky isn't completely falling, though. Not yet, at least.
A large percentage of the Windows XP systems still in use will continue to receive extended support from Microsoft. Support has not yet expired for Windows XP Embedded systems, and Microsoft has reportedly agreed to extend support for Windows XP in China, where XP still accounts for more than 50% of desktop market share. Some government and large enterprise customers have also paid millions for extended Windows XP support.
However, if you're not a government or enterprise, and you don't live in China, the risk of exploit or compromise of your Windows XP system will increase over time. Qualys' Kandek explains, "I expect Windows XP defensibility to deteriorate quickly over the next few weeks and months as attackers will find ways to exploit certain aspects of the operating system, internet browser, mail programs, office software (Office 2003 is also EOL), and even third-party programs such your PDF reader (Adobe says they will not update Adobe Reader on XP anymore)."
Starting with the next Patch Tuesday in May, Microsoft will only release patches and updates to fix flaws in supported versions of Windows. Microsoft won't test Windows XP to verify whether or not those same flaws exist in the legacy OS, nor will it develop a patch to fix the unsupported platform. Attackers, however, will be able to reverse engineer the updates Microsoft develops for later versions of Windows to identify the vulnerabilities patched, figure out if those same holes exist in Windows XP, and craft exploits to compromise the vulnerable systems.
Those who ignore the mountain of warnings and continue to use Windows XP do so at their own risk. Unfortunately, their risk is also our risk, because compromised systems end up in botnets, distributing spam, or hosting and distributing malware. Continuing to use Windows XP on the public internet is akin to going out in public with an active virus and coughing on people.
Do yourself and everyone else a favor. Either make a switch to a supported operating system... or move to China.

Thursday, 3 April 2014

  1. For more information or support visit: http://lington-concept.gnbo.com.ng
     
    1
    Give your computer a bit of rest. If you leave your computer on all the time, you can often fix a problem by unplugging it, waiting at least 30 seconds, and plugging it back in. By cutting off the power to the motherboard, it allows the hardware to reset and the memory to clear.
    Ad
  2. Replace the Battery in Your PC Step 3.jpg
    2
    Determine if your computer becomes too hot. You will need to take a look inside for this. Remember that any time you need to open up your computer cabinet, shut down your computer and unplug it. If you have long hair, tie it back. Take off any jewelry that might get in the way. Also avoid wearing any clothing that produces a lot of static, as a spark can damage hardware and cause intermittent, hard-to-troubleshoot problems.
  3. Repair Computer Step 3.jpg
    3
    Open the cabinet of your computer and check the temperature of the metal chassis. If it’s hot, then certainly there is some thermal problem. Gently examine the front and rear fans and blow out any dust. You can apply a clean cloth to dust out hidden particles. Remember: Your computer must be shut down while you're cleaning inside it.
    • If you have more than one hard drive in your computer, avoid installing them right next to each other in the chassis; this makes them more prone to heat failure. To install an extra hard drive in a wide slot, such as the slot that holds your CD-ROM or DVD-ROM drive, you can buy mounting brackets at a store that sells computer parts.
      Repair Computer Step 3Bullet1.jpg
    • Even if your computer isn't having problems, it's a good idea to clean the fans regularly.
      Repair Computer Step 3Bullet2.jpg
    • Before you close up the case, check all the cables and make sure everything is still plugged in. If you have to reset a video card or a stick of memory, avoid applying heavy pressure to the motherboard as this can damage it.
      Disable the Onboard Graphics and Install a New Graphics Card in Your HP Pavilion 6630 Step 7.jpg
  4. Repair Computer Step 4.jpg
    4
    Inspect your Device Drivers. Many times when doing a Windows Update, your system may download and install an incorrect driver, which may result in the computer freezing. You can check the status of drivers from Device Manager. Unplug your USB device, if connected. Power-on your computer and see if it works. If it does, good; otherwise you can restore your computer to an earlier configuration. System Restore will roll your system back to an earlier set of drivers.
  5. Repair Computer Step 5.jpg
    5
    Access System Restore at Start>Programs>Accessories>System Tools>System Restore to try and restore whatever settings you might have changed,
  6. Repair Computer Step 6.jpg
    6
    Inspect your Hard Disk.Your hard disk is a storehouse of information, so when it gets used for a long duration it might get cluttered and patchy; this slows down the performance of your computer. Hence, use your Windows utility CHKDSK to scan and remove bad sectors on regular basis. It is the best preventive way of maintaining computer health.