SUPERAntiSpyware
is the most thorough scanner on the market. Our Multi-Dimensional Scanning and Process Interrogation
Technology will detect spyware that other products miss! SUPERAntiSpyware will remove ALL the Spyware, NOT just the easy ones!
Easily remove over 100,000 pests
such as SmitFraud, Vundo, WinFixer, SpyAxe, SpyFalcon, WinAntiVirus,
AntiVermins and thousands more!
Quick, Complete and Custom Scanning
of Hard Drives, Removable Drives, Memory, Registry, Individual Folders and More! Includes Trusting
Items and Excluding Folders for complete customization of scanning!
Detect and Remove
Spyware, Adware, Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers, Parasites, Rootkits and
many other types of threats.
Light on System Resources
and won't slow down your computer like many other anti-spyware products. Won't conflict with your
existing anti-spyware or anti-virus solution!
Repair broken Internet
Connections, Desktops, Registry Editing and more with our unique Repair System!
Real-Time Blocking
of threats! Prevent potentially harmful software from installing or re-installing!*
Multi-Dimensional Scanning
detects existing threats as well as threats of the future by analyzing threat characteristics in
addition to code patterns.
First Chance Prevention
examines over 50 critical points of your system each time your system starts up and shuts down
to eliminate threats before they have a chance to infect and infiltrate your system.
Process Interrogation
Technology allows threats to be detected no matter where they are hiding on your system.
Schedule
either Quick, Complete or Custom Scans Daily or Weekly to ensure your computer is free from harmful
software.*
Dedicated Threat Research
Team scours the web for new threats and provides daily definition
updates.*
This is a great site, if you think you have
a virus and you want a second opinion why not have fifteen opinion's at once. This scan's your file with fifteen differnt
virus scanner's at once. Virus definitions are updated every hour. There is a 15Mb limit per file. Click on the Browse... button at the top and navigate to the following file and then click on Submit:
The virus scanners that jotti's use are as
follow's...
AntiVir - ArcaVir
- Avast - AVG Antivirus - BitDefender
ClamAV - Dr.Web
- F-Prot Antivirus - Fortinet - Kaspersky Anti-Virus
NOD32 - Norman Virus Control - UNA - VirusBuster
- VBA32
Virustotal offers a free service for scanning suspicious files using several antivirus engines.
Click on the Browse... button at the top and navigate to the following file and then click on Submit:
Think you may have a virus? Take advantage of this
free online virus scanner.
AVG Anti-Virus Free and ewido anti-spyware Free is for
private, non-commercial, single home computer use only.
-= General Virus Information =-
What is a computer Virus?
A virus is a program, which reproduces
its own code by attacking other programs in such a way that the virus code is executed. The virus does this without the permission
or knowledge of the user. There are several ways to get a computer infected by a virus. Depending on the type of virus and
the files it attacks, the consequences will be different. In general, viruses need a host to infect. Computers and programs
are the ideal support for virus attacks. The potential of viruses is to destroy software, modify programs, delete files etc.
This all happens at the same time as the virus spreads itself. The end result is that you are no longer in control of your
computer. Every time you boot your computer or execute a program, the virus will be executing and spreading too.
How
computers get infected
The most common ways
to infect your computer with a virus are:
- By executing an infected program or booting from an infected disk.
For example, if you put an infected disk into your computer and run it, then you are likely to infect your computer with the
virus.
- You cannot get a virus by being on the Internet, or by being online.
You can only get infected by downloading an infected file and by executing that file. For example, if you download executable
software from public-access sites on the Internet.
- By sharing computer programs and system disks. You are never sure
of what a file, program, disk may contain.
- By opening an e-mail attachment file containing a virus
Signs you might have
a Virus
There are only so many ways for a computer to get infected
by a virus. If your computer seems to have a problem, it does not necessarily mean that it's a virus. Here are a few indicators
that the problem might not be a virus:
- if your hard disk doesn't work anymore or you receive a normal
error message
- if your hard disk light seems to come on for no particular
reason: this is a periodic system check
In any of the cases above, first check out your computer
and see if there is any possible problem with the hardware or the software. Not all problems are linked to viruses.
More signs:
- Unusual error message displays. For example: "This one is for you,
Bosco", "ROBERTA TI AMO!", "Just to prove another point" etc.
- Files are missing or have increased in size. For example, several
.COM and/or .EXE files on your computer are all larger than they used to be, by about the same amount.
- System operates slower
- Sudden lack of disk space
- Cannot access disk
- Your computer asks for a password and you know your file doesn't
contain or request one
- Unusual changes to your documents. For example, a macro virus can
randomly move three words, then insert the word "WAZZU" at random locations.
- If you try to save a Word
for Windows document (using File|Save As), the options are grayed-out. You cannot select the drive, folder or directory in
which to save the file; and 'Document Template is the selected option in the 'Save File as Type' box
What do Viruses
do?
A virus has two phases to execution: the infection
phase and the attack phase. The time span between the infection and the attack of a virus can vary depending on the type of
virus.
Infection phase: Some
viruses infect programs each time the program is executed whereas other viruses infect only upon a certain trigger. For example,
at a specific date, the virus will infect a program. There are many other kinds of triggers. Some viruses are called "resident
viruses", this means that they reside in the memory of the computer. The virus is dormant and is only triggered by certain
events such as inserting a disk, copying a file or executing a program.
Attack phase:
This is when the virus goes into action. It will for example, delete files, change random data on your disk or slow down the
computer. Other kinds of viruses do less harmful things, such as play music, create messages or animation on your screen.
This might not seem to be a virus but be aware of these kinds of behaviors.
Different types
of Viruses
The System Sector Virus (known
as the Boot Sector Virus) infects the boot sector on a computer system. First it moves or overwrites the original boot code,
replacing it with infected boot codes. Then the virus will move the original boot sector information to another sector on
the disk, marking that sector as a bad spot on the disk so it will not be used in the future. To be infected by this type
of virus, you must boot the computer using an infected floppy disk. For example, if a user leaves an infected floppy disk
in the disk drive and you reboot the computer, then you will bring the virus into the system. Names of Boot Sector
Viruses: Joshi, Devil's Dance, V-Sign.
File virus. This is one of the most common viruses found. These viruses work by locating a type of file that they know how to infect
(for example, files ending with .COM or .EXE) and by overwriting part of the program they are infecting. When the program
is executed, the virus code executes and infects more files. Some of the viruses are easily found whereas others hide and
you cannot see differences in files. Names of File Viruses: Casino, Boza, Tentacle, Win32/CIH.
Macro virus.
These kinds of viruses use an application's own macro programming language to distribute themselves. Macro viruses
can infect Word files, as well as any other application that uses a programming language. These viruses infect documents,
templates but not programs. When you open a document or a template that contains a macro virus, then the virus will spread
to other documents and templates you may have on your system. For example, a macro virus can change, delete document contents,
change settings in the Word environment, set a password, copy a DOS virus to the user's system and much more… Moreover,
macro viruses have the potentiality of spreading across different platforms such as PC to Mac. If you are familiar with the
Word macros you have on your system, you can look through the various macros for ones that you do not recognize. Examples
of types of macro viruses: AAAZAO, AAAZFS, AutoOpen, FileSaveAs, PayLoad etc.
Polymorphic viruses. These types of viruses change their appearance with each
infection. Some polymorphic viruses assume over 2 billion different appearances and this makes it hard for the anti-virus
software to detect them.
Stealth viruses. This virus attempts to hide itself from the operating system
and anti-virus software. The virus stays in the memory of the computer and it can hide the changes it makes to file sizes,
directory structures and other operating system aspects. This makes it hard to detect the virus.
Multi-polymorphic viruses. This type of virus affects both boot sectors and executable
files. They can combine some of the characteristics of stealth and polymorphic viruses.
How to protect your computer
Install AVG Free Antivirus on your computer. And update your Virus Data File Regulary ! ! Think
of it as a FBI's Most Wanted List. Without an updated file, your Anti-Virus software won't detect new Viruses.
- Be very cautious about e-mail attachments. This is the most common
way to spread Viruses. Never open an attachment from someone you don't know, and be wary of unexpected/odd sounding attachments
from friends. Some recent Viruses use the victim's address book to send copies of itself.
- Some macro virus protection tools are built into some versions
of Microsoft Office while other tools must be installed separately.
- Keep your original application and system disks locked (or write
protected). This will prevent the virus from spreading to your original disk.
- If you must insert one of your disks into an unknown machine, lock
(write protect) it first, and unlock your application disk only after verifying that the machine is virus free.
- Avoid sharing computer programs and system disks
- Back up your files. Viruses are a good reason to keep an extra
copy of your documents.
|