Jump to content

Kouros

Members
  • Content Count

    5
  • Donations

    $0.00 
  • Joined

  • Last visited

Community Reputation

5 Neutral

1 Follower

About Kouros

  • Rank
    CW Lifetime VIP

Profile Information

  • Gender
    Not Telling
  1. Kouros

    DRM Removal

    Try "Daniusoft DRM Converter" its working...
  2. you should buy unlocked iphone 4S through usa store , but iphone 4S unlocked will available November ( not now ) so you should pay 649$ for 16 or 749$ for 32gb or 849$ for 64GB it not possible for you to buy for 200$ without contract , also if you buy with contract & cancel it you should pay extra money ( same amount ex. 749 ) the best solution for you is to wait until November ( or pre-order now ) an unlocked iphone through USA apple store
  3. Kouros

    Pc Protection Guide

    HOW TO REMOVE Malwares When Infected What if my computer is infected? Unfortunately, it may happen occasionally that the antivirus installed in your computer with its latest updates is incapable of detecting a new virus, worm or a Trojan. Sadly but true: no antivirus protection software gives you a 100% guarantee of complete security. If your computer does get infected, you need to determine the fact of infection, identify the infected file and send it to the vendor whose product missed the malicious program and failed to protect your computer. However, users on their own are typically unable to detect that their computer got infected unless aided by antivirus solutions. Many worms and Trojans typically do not reveal their presence in any way. By way of exception, some Trojans do inform the user directly that their computer has been infected – they may encrypt the user’s personal files so as to demand a ransom for the decryption utility. However, a Trojan typically installs itself secretly in the system, often employs special disguising methods and also covertly does its activity. So, the fact of infection can be detected by indirect evidence only. Symptoms of infection An increase in the outgoing web traffic is the general indication of an infection; this applies to both individual computers and corporate networks. If no users are working in the Internet in a specific time period (e.g. at night), but the web traffic continues, this could mean that somebody or someone else is active on the system, and most probably that is a malicious activity. In a firewall is configured in the system, attempts by unknown applications to establish Internet connections may be indicative of an infection. Numerous advertisement windows popping up while visiting web-sites may signal that an adware in present in the system. If a computer freezes or crashes frequently, this may be also related to a malware activity. Such malfunctions are more often accounted for by hardware or software malfunctions rather than a virus activity. However, if similar symptoms simultaneously occur on multiple or numerous computers on the network, accompanied by a dramatic increase in the internal traffic, this is very likely caused by a network worm or a backdoor Trojan spreading across the network. An infection may be also indirectly evidenced by non-computer related symptoms, such as bills for telephone calls that nobody made or SMS messages that nobody sent. Such facts may indicate that a phone Trojan is active in the computer or the cell phone. If unauthorized access has been gained to your personal bank account or your credit card has bee used without your authorization, this may signal that a spyware has intruded into your system. [First Step] Update your computer's operating system. For Windows operating systems, click the Start Menu button. Select "All programs," and then select "Windows updates." Your computer will automatically detect any important updates you may need to install. Visit microsoft.com to install the latest updates for your computer. [second Step] [Tip-First Step] Use an available online scanner. Many of the major AV vendors provide this facility including: BitDefender http://www.bitdefender.com/scanner/online/free.html Kaspersky Lab http://www.kaspersky.com/virusscanner Eset http://www.eset.com/onlinescan/ F-Secure http://www.f-secure.com/en_EMEA/security/security-lab/tools-and-services/online-scanner/ McAfee http://home.mcafee.com/Downloads/FreeScan.aspx Trend Micro http://housecall.trendmicro.com/ Avast http://onlinescan.avast.com/ and so on. For the evaluation of single files, the online multiscanners VirusTotal http://www.virustotal.com/ Jotti’s malware scan http://virusscan.jotti.org/en are available. [Tip-Second Step] Use of a portable software application which runs as a standalone executable. Check for availability among your preferred tools. [Third Step] Update your antivirus software and computer firewall. Visit the manufacturer's website for the latest updates. If you do not currently have antivirus/Firewall software, download or purchase some. You can download both free and paid copies online or purchase it from a retailer. [4th Step] Open the antivirus software and click "Scan." Choose a full computer scan rather than a quick scan. Allow the software to repair or isolate any viruses it discovers. Some files may need to be completely deleted. In case you have Infected with a FUD malwares ( full undetected ) : -Find malware file & compress it ( .zip ) -Password the archive -Send it to antivirus labs Labs: Kaspersky: http://support.kaspersky.ru/virlab/h...k.html?LANG=en Eset : http://kb.eset.com/esetkb/index?page=content&id=SOLN141 Mcafee: http://www.mcafee.com/us/mcafee-labs/resources/how-to-submit-sample.aspx Frisk : http://www.f-prot.com/virusinfo/submission_form.html F-Secure: https://analysis.f-secure.com/portal/login.html Avira: http://analysis.avira.com/samples/ Microsoft : https://www.microsoft.com/security/p...on/Submit.aspx Trend Micro: http://subwiz.trendmicro.com/SubWiz/Default.asp Comodo: http://www.comodo.com/home/internet-security/submit.php ClamAV: http://cgi.clamav.net/sendvirus.cgi Dr. Web: http://vms.drweb-av.de/sendvirus/ CA: http://www.ca.com/us/securityadvisor/submitmalware.aspx A-Squared: http://www.emsisoft.com/en/support/submit/ Norton: https://submit.symantec.com/websubmit/retail.cgi QuickHeal: http://www.quickheal.co.in/submit_sample.asp Vipre: http://www.sunbeltsecurity.com/threat/ Norman: http://www.norman.com/support/sendmalware/en VirusBuster: https://support.virusbuster.hu/index.php?_m=tickets&_a=submit AhnLab: http://global.ahnlab.com/en/site/support/virusreport/virusReport.do RemoveIt pro: http://www.incodesolutions.com/reportvirus.php Malwarebytes: http://uploads.malwarebytes.org/ Superantispyware: http://www.superantispyware.com/blog/2009/05/28/supersamplesubmit-an-easy-way-to-submit-samples/ AVG: http://forums.avg.com/ww-en/avg-free-forum?sec=thread&act=show&id=397 Avast: http://support.avast.com/index.php?_m=knowledgebase&_a=viewarticle&kbarticleid=199&nav=0,1 Lavasoft: http://www.lavasoft.com/support/securitycenter/file_upload.php Agnitum: http://www.agnitum.com/support/submit_files.php Webroot: http://support.webroot.com/cgi-bin/webroot.cfg/php/enduser/ask.php The Hacker: http://www.hacksoft.com.pe/upload/ubr_file_upload.php nProtect: http://global.nprotect.com/security/virus_report.php Sophos: https://secure.sophos.com/support/samples Iobit: http://db.iobit.com/deal/sdsubmit/index.php Digital Patrol: http://www.nictasoft.com/new-virus/ Kingsoft: http://www.pc120.com/fileident/ PC Tools: http://www.pctools.com/mrc/submit/ Rising: http://mailcenter.rising.com.cn/filecheck_en Bitdefender: http://www.malwarecity.com/site/Main/uploadMalware eScan: http://www.escanav.com/english/content/support_training/support/submitsample.asp Maxsecureantivirus: http://www.maxsecureantivirus.com/submitThreat.htm -Wait for antivirus labs to Release update for database CP Moderator Message: Mr Grumpy - Coded links
  4. In This Topic , i will give you some information about Viruses , trojans , worms , spyware & other threats & how to stay clean;) Copyright © CyberWarez - Kouros so WHAT IS MALWARE ? Malware, short for malicious software, is programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior.The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. Having Safe Digital Life : [First Step] always update your Os & use Latest Release For latest Os Release From microsoft : http://www.microsoft.com/Windows You can Use this to Update your Windows : windowsupdate.microsoft.com Windows Update is a service provided by Microsoft that provides updates for the Microsoft Windows operating system and its installed components, including Internet Explorer. An optional feature disables access to Windows Update, enabling instead access to Microsoft Update, an expanded version of the service which provides updates not just for the operating system and Internet Explorer, but also for other Microsoft software running under Windows, such as Microsoft Office, Windows Live applications, and Microsoft Expression Studio. Updates are normally provided over an Internet connection, although there is provision for updates to be installed on computers without an Internet connection. Security updates or critical updates eliminate vulnerability to known malware and security exploits. Other updates correct errors and enhance functionality. Security updates are routinely provided on the second Tuesday of each month, Patch Tuesday, but can be provided whenever a new update is urgently required to prevent a newly discovered or prevalent exploit targeting Windows users. Windows Update can be configured to install critical updates automatically so long as the computer is connected to the Internet, without the user needing to install them manually, or even be aware that an update is required [second Step] Use Trusted Firewall - Antivirus Always use Alternate Firewall/Antivirus instead of windows Firewall or Defender ( Disable Both of them – Windows Firewall & Defender ) Here Is a Small list Antivirus/Firewall that u can use : Ad-Aware Pro avast! Free Antivirus AVG Anti-Virus Free Edition Avira AntiVir Personal BitDefender Antivirus BitDefender Antivirus Pro BullGuard Internet Security CA Anti-Virus Plus Anti-Spyware Comodo Antivirus Coranti Dr.Web anti-virus for Windows Emsisoft Anti-Malware ESET NOD32 Antivirus F-Secure Anti-Virus G Data AntiVirus IKARUS virus.utilities Immunet Protect Plus Kaspersky Anti-Virus Kaspersky Internet Security Kaspersky PURE Malwarebytes' Anti-Malware McAfee AntiVirus Plus McAfee Internet Security Microsoft Security Essentials Norman Antivirus & Antispyware Norton 360 Norton Antivirus Outpost Antivirus Pro Panda Antivirus Pro Panda Cloud Antivirus Pro Preventon Antivirus Free Prevx Quick Heal AntiVirus Rising Antivirus Sophos Endpoint Security and Control (Anti-Virus) Trend Micro Internet Security Trend Micro Titanium Antivirus+ VIPRE Antivirus Webroot Antivirus with Spy Sweeper ZoneAlarm Anti-virus [second Step-Tips] -Always Use Latest Version of Security Apps -Update your virus definitions regularly -Don't run more than one real time Antivirus together. -Don’t use illegal keys/cracks/serials for antivirus , try to purchase legal version from manufactured sites -Get immediate protection. Configure your antivirus software to boot automatically on start-up and run at all times. This will provide you back-up protection in case you forget to scan an attachment, or decide not to. And in case you forget to boot up your antivirus software, configuring it to start by itself will ensure you get immediate protection anyway. -Run a Virus Scan ( quick scan ) once in a week & Run FULL Scan once in a month [third Step] Use Secure Browser Chrome : http://www.google.com/chrome Mozilla Firefox : http://www.mozilla.com/en-US/firefox/ Safari : http://www.apple.com/safari/ Opera: http://www.opera.com/ IE9-Internet Explorer 9 ( Not Old Versions ! Only Latest ) : http://www.microsoft.com/IE9 [step 4] Have One of Anti-viruses Rescue Disk , it’s a live cd which help you when u need them ! Here is a small list of Rescue Disks , I will complete this list later : Kaspersky Rescue Disk http://support.kaspersky.com/viruses/rescuedisk?level=2 Avira AntiVir Rescue System http://www.free-av.com/en/products/12/avira_antivir_rescue_system.html AVG Rescue CD http://www.avg.com/us-en/avg-rescue-cd-download F-Secure Rescue CD http://www.f-secure.com/en_EMEA/security/tools/rescue-cd/ Panda SafeCD http://safecd.pl.pandasecurity.com/ BitDefender Rescue CD http://download.bitdefender.com/rescue_cd/ norton rescue disk http://security.symantec.com/nbrt/nbrt.asp?lcid=1033&origin=default avast rescue disk http://www.avast.com/eng/avast_bart_cd.html [step 5] -Start running under a limited user account (XP) or keep UAC enabled (Vista/Win 7) -Use Your windows in virtual environment to avoid writing data to the hard drive so it prevents malwares from making permanent changes to other programs and data in your computer. You can use Sandbox security software - Some Antivirus/firewalls have this option like “Safe Run” in Kaspersky CP Moderator Message: Mr Grumpy - Coded links
×