Monday 30 September 2013

How to remove Generic32.HRP completely





Manual removal is a complicated and risky process, so please back up all important data before making any changes on your computer. Here are some instructions to handle with the Trojan horse manually, and be cautious when going through the following steps.
1. Press Ctrl+Alt+Del keys together and stop Generic32.HRP virus processes in the Windows Task Manager.




2. Go to Folder Options from Control Panel. Under View tab, select Show hidden files and folders and uncheck Hide protected operating system files (Recommended), and then click OK. Remember to back up beforehand.
 


3. Press Windows+ R keys and search for regedit in Run. Delete associated files and registry entries related to Xx virus from your PC completely as follows:
%APPDATA%\[RANDOM CHARACTERS].js
%APPDATA%\[RANDOM CHARACTERS].pad
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\{random}
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “CertificateRevocation” = ’0′
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\Current\Winlogon\”Shell” = “{random}.exe”
4. Reboot the computer normally to take effective, when the above steps are done.

 

This actually happens! Laptop gets infected with spyware > Computer owner get frustrated and punches the LCD Screen > Cracked LCD Screen leads to even more problems. > Spyware Prevention can save your computer from so much more than just getting infected!
Guess what other problem you are likely to have when you have a bad LCD Screen, whether it is cracked or distorted with lines? How about a corrupted Windows installation due to errors on the Hard Drive...or worse! Read on...

For some reason, people with bad LCD Screens keep turning their computer on and off, as if the cracks or lines will go away by themselves. But the problem in this is: How are you going to properly shut down your computer if you can't even see where your cursor is?

Performing hard shutdowns for "any" reason is bad for your Hard Drive. It can lead to Windows problems, lost data and a Hard Dive that needs to be replaced in addition to the LCD Screen. Read more about this at:

 

 

 

Post a Question....




Types Of Computer Viruses



Not all computer viruses behave, replicate, or infect the same way. There are several different categories of viruses and malware. Below I list and discuss some of the most common types of computer viruses.

Trojan Horse:
A trojan horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.

Worms:
A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail.

Bootsector Virus:
A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup. These are normally spread by floppy disks.

Macro Virus:
Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents.

Memory Resident Viruses:
Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes.

Rootkit Virus:
A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term rootkit comes from the linux administrator root user. These viruses are usually installed by trojans and are normally disguised as operating system files.

Polymorphic Viruses:
A polymorphic virus not only replicates itself by creating multiple files of itself, but it also changes it's digital signature every time it replicates. This makes it difficult for less sophisticated antivirus software to detect.

Logic Bombs/Time Bombs:
These are viruses which are programmed to initiate at a specific date or when a specific event occurs. Some examples are a virus which deletes your photos on Halloween, or a virus which deletes a database table if a certain employee gets fired.

Facebook virus or account hacked? Here's how to fix it.


You've just discovered your Facebook account has been posting all kinds of weird, pornographic, or generally inappropriate content to your Wall and/or News Feed. Your friends are annoyed with all the questionable posts and requests coming from you.
Did you forget to log out of Facebook at your friend's house, did you accidentally click on something you shouldn't have, or has your account been hacked?
I can't answer these questions without actually seeing what's happening on your profile, but I can offer some advice. Here are four things you should try in order to clean up your Facebook account.

Reclaim your account

If you can no longer login to Facebook, you'll want to follow these instructions from the

Change your Facebook password

It's possible your Facebook woes are coming from the result of a phishing scam. Someone may have created a fake website that looks like Facebook or another online service you visit and tricked you into logging in. Their goal was to steal your password and other account credentials, and they may have succeeded.
In this case, you should change your password on Facebook. If you don't know how to do so, you can refer to the following guide: How to change your Facebook password.
If changing your password fixes your Facebook problems, you should change your password for all your other services too, especially if you use the same password for them as you previously used on Facebook. If this doesn't fix the problem, try the next step.

Remove unwanted Facebook apps

It's possible your Facebook woes are coming from a rogue app that you accidentally installed or were tricked into installing. Every Facebook app has certain permissions to your account. Some of these permissions you can modify, while others you cannot.
Your best bet is to remove all the Facebook apps you find suspicious. If you don't know how to do so, you can refer to the following guide: How to clean up your Facebook apps.
If cleaning out your apps fixes your Facebook problems, tell your friends they should do the same (chances are the app asked your friends to install it as well). If this doesn't fix the problem, try the next step.

Get some security software and run a virus scan

It's possible your Facebook woes are coming from some sort of malware, be it a keylogger, a trojan, or some other type of virus. Even if you think your computer is clean, it can't hurt to check.
I recommend Microsoft Security Essentials ?it's free and gets the job done very well. Another good one is Malwarebytes. Other free alternatives include Avira and Avast.
The aforementioned security programs are for Windows. If you have a Mac, try using the antivirus from Sophos.
After running the virus scan, clean out whatever the program detects. If you're not sure about what it found, ask a friend who might.

Post a Question....

Monday 29 October 2012

How to Bypass Surveys? Online Surveys and Your Privacy



Several times a day, most days of the week, we receive email from our readers asking the same question: how to bypass surveys? (mostly sharecash, CPALead and file ice). We love getting email, however, it's not always possible for us to reply individually and we are starting to get a little bored.

We think surveys is pretty much always a sign of a scam, so probably no one's going to like this answer. Here's how it works. CPA (cost per action) ad networks pay only when the desired action has occurred; for example, an online survey has been successfully completed. Affiliate marketers make commission based off your submission of information to a company database. It can be email address, phone number or any other information about you. This information can and probably will be used in future marketing campaigns.

Let's say you want to watch your favorite TV show online. You found a website which looks legit and has your favorite TV show. You're about to watch it but the website brings you to a survey that you have to fill out to get to the content. Usually, you can choose from several offers. My all time 'favorite' is the Love Thermometer. Basically, you need to sign up for the Love Thermometer by entering your phone number. It costs $10 per week to send your 'scores'. Bonus: they will send ads to your phone. Isn't that great? Honestly, it doesn't worth the risk. The truth be told, there are literally hundreds of fake internet survey websites. So, I wouldn't fill out paid surveys if I were you. After all, you may not get the requested file or video simply because it doesn't exist. There are many free and safe websites that offer file downloads and video streaming without annoying pop-up surveys.

Recently we stumbled upon another potentially harmful online survey which encourages users to install free 'Coupon Printer'. Everyone wants to save money, so Coupon Printer isn't such a bad idea after all. However, you need to read every single line very carefully before installing 'printers' and other software recommend in surveys. In our case, the 'Coupon Printer' offer came with an extra 'ingredient' -- MyWebSearch adware. We couldn't even finish the survey because our antivirus software blocked it.

Unfortunately, there's no easy way to bypass surveys on websites. Let's take Share Cash surveys for instance. You can't really bypass their extremely annoying surveys and it's not because we haven't tried, it's because the way they laid it out. Disabling JavaScript in your web browser won't help. Using XJZ survey remover and NoScript add-on won't help you either. None of these tools can actually fill out or skip surveys for you. They are designed to reveal premium (protected) content in a slightly different way. Please note, surveys ≠ 'premium' content lockers. However, you might get lucky with other survey websites.

Bypassing surveys:

1. Survey-remover.com, formerly known as XJZ Survey Remover. This bookmarklet was designed to reveal protected areas on websites. Removes surveys most of the time but it doesn't work if the survey leads to a download (sharecash). Works on Mozilla Firefox and Google Chrome. For more details, please visit this website

2. Use NoScript. A great web browser add-on trusted by many PC users. It was designed to block malicious JavaScript files but in some cases it may help you to bypass pop-up surveys too.

3. Disable JavaScript. This method is the most easiest one. However, we have to admit it rarely works. Most likely, you will get an error message followed by step-by-step instructions on how to enable JavaScript in your web browser.

We hope this helps. If you have any questions that aren't answered here, please feel free to contact us. Simply leave a comment below. Also, if you know how to bypass specific surveys sites, please share the information with our readers. Good luck and be safe online!

Read More…

Call Us +1-855-517-2433 (Toll Free)