Minggu, 23 Februari 2014

Jumat, 21 Februari 2014

This is Your New Weapon Against Various Types of Diseases That May Harm Your Computer !



Dear visitors, I believe you all must have known what we wrote in this blog maybe even some of you look at this blog is not useful to add to your knowledge in computer security. But one thing we want to achieve by writing this blog, there may be a small part of you that knows the ins and outs and less security risk internet-connected computer. 

Many of the end of the internet either consciously or not has become a victim of fraud due to various forms of attack by those who called malware.

Berkas:Msf3-hashdump small.jpg


Whether it's malware?

Malware, short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.

File: statika Malware 2011-03-16-en.svg

Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious BHOs, rogue security software, govware, and other malicious programs; the majority of active malware threats are usually worms or trojans rather than viruses. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states. 

Malware is different from defective software, which is a legitimate software but contains harmful bugs that were not corrected before release. However, some malware is disguised as genuine software, and may come from an official company website in the form of a useful or attractive program which has the harmful malware embedded in it along with additional tracking software that gathers marketing statistics.

Many early infectious programs, including the first Internet Worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments alike primarily to steal sensitive information of personal, financial, or business importance.

Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general. However, malware is often used against individuals to gain personal information such as social security numbers, bank or credit card numbers, and so on. 

Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for black-market exploitation. Infected "zombie computers" are used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.

Another category of malware has emerged, called spyware. These programs are designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues to the spyware creator. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be packaged together with user-installed software, such as peer-to-peer applications.

The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any specific types of behavior. The term computer virus is used for a program that has infected some executable software and, when run, causes the virus to spread to other executables. 

On the other hand, a worm is a program that actively transmits itself over a network to infect other computers. These definitions lead to the observation that a virus requires user intervention to spread, whereas a worm spreads itself automatically. Using this distinction, infections transmitted by email or Microsoft Word documents, which rely on the recipient opening a file or email to infect the system, would be classified as viruses rather than worms.

For a malicious program to accomplish its goals, it must be able to run without being detected, shut down, or deleted. When a malicious program is disguised as something normal or desirable, users may willfully install it without realizing it. This is the technique of the Trojan horse or trojan. In broad terms, a Trojan horse is any program that invites the user to run it, concealing harmful or malicious code. The code may take effect immediately and can lead to many undesirable effects, such as deleting the user's files or installing additional harmful software. One of the most common ways that spyware is distributed is as a Trojan horse, bundled with a piece of desirable software that the user downloads from the Internet. When the user installs the software, the spyware is installed along with it. 

Spyware authors who attempt to act in a legal fashion may include an end-user license agreement that states the behavior of the spyware in loose terms, which users may not read or understand. (Read our article : http://mypcdefender.blogspot.com/2014/02/baidu-pc-faster-foistware_18.html)

Once a malicious program is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a malicious process from being visible in the system's list of processes, or keep its files from being read. Some malicious programs contain routines to defend against removal, not merely to hide themselves.

A backdoor is a method of bypassing normal authentication procedures. Once a system has been compromised, one or more backdoors may be installed in order to allow easier access in the future. Backdoors may also be installed prior to malicious software, to allow attackers entry. The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. Recently it came to light that government agencies have been preinstalling backdoors on private computers purchased online. Backdoors secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors crackers may use Trojan horses, worms, Implants or other methods.

Grayware (or greyware) is a general term that refers to applications or files that are not directly classified as malware (like worms or trojan horses), but can still negatively affect the performance of computers and involve significant security risks. It describes applications that behave in an annoying or undesirable manner, and yet are less serious or troublesome than malware. Grayware encompasses spyware, adware, dialers, joke programs, remote access tools and any other program apart from a virus, that is designed to harm the performance of computers. The term is in use since around 2004.

Another term, PUP, which stands for Potentially Unwanted Program (or PUA Potentially Unwanted Application), refers to applications that would be considered unwanted despite having been downloaded by the user (users may fail to read a download agreement). PUPs include spyware, adware, and dialers.

Malware exploits security defects (security bugs, or vulnerabilities) in the design of the operating system, in applications (such as browsers—avoid using Internet Explorer 8 or earlier, e.g. on Windows XP), or in (old versions of) browser plugins such as Adobe Flash Player, Adobe Acrobat / Reader, or Java (see Java SE critical security issues). Sometimes even installing new versions of such plugins does not automatically uninstall old versions. Security advisories from such companies announce security-related updates.

Most systems contain bugs, or loopholes, which may be exploited by malware. A typical example is a buffer-overrun vulnerability, in which an interface designed to store data, in a small area of memory, allows the caller to supply more data than will fit. This extra data then overwrites the interface's own executable structure (past the end of the buffer and other data). In this manner, malware can force the system to execute malicious code, by replacing legitimate code with its own payload of instructions (or data values) copied into live memory, outside the buffer area.


Anti-malware strategies.


As malware attacks become more frequent, attention has begun to shift from viruses and spyware protection, to malware protection, and programs that have been specifically developed to combat malware. Other preventive and recovery measures, such as backup and recovery methods.

A specific component of the Anti virus and anti-malware software commonly referred as the on-access or real-time scanner, hooks deep into the operating system's core or kernel functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. 

Any time the operating system accesses a file, the on-access scanner checks if the file is a 'legitimate' file or not. If the file is considered a malware by the scanner, the access operation will be stopped, the file will be dealt by the scanner in pre-defined way (how the Anti-virus program was configured during/post installation) and the user will be notified. This may considerably slow down the operating system depending on how well the scanner was programmed. The goal is to stop any operations the malware may attempt on the system before they occur, including activities which might exploit bugs or trigger unexpected operating system behavior.

Anti-malware programs can combat malware in two ways:
  • They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.
  • Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.

Real-time protection from malware works identically to real-time antivirus protection: the software scans disk files at download time, and blocks the activity of components known to represent malware. In some cases, it may also intercept attempts to install start-up items or to modify browser settings. Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to "sandbox" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done.

Several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). A test has found a free program to be competitive with commercial competitors. Some viruses disable System Restore and other important Windows tools such as Task Manager and Command Prompt. Many such viruses can be removed by rebooting the computer, entering Windows safe mode with networking, and then using system tools or Microsoft Safety Scanner. 

Well after knowing what and how the dangers of malware attacks, now please you hunt a variety of programs to minimize the risk of getting malware. 
Broadly speaking, all the computer programs (including anti-malware / virus) is divided into 2 types: 
  • Programs that use should be installed computers. 
  • Programs that use does not need to be installed on the computer (portable). 
Here various latest computer security programs today (February 20, 2014) along with download links, all freeware, free to use in your home (not for business purposes).


Programs that use should be installed computers.

1. AntiVir Antivirus.


Avira AntiVir Personal - FREE Antivirus is a reliable free antivirus solution, that constantly and rapidly scans your computer for malicious programs such as viruses, Trojans, backdoor programs, hoaxes, worms, dialers etc. Monitors every action executed by the user or the operating system and reacts promptly when a malicious program is detected.

Avira Free AntiVirus protects you from viruses, Trojans, worms, spyware, adware, and various other kinds of malware, making it a fully functional antimalware tool and certainly one of the best free antivirus programs.

Avira Free AntiVirus (version 14) works on Windows 8, Windows 7, Windows Vista, and Windows XP. Avira also makes Avira Free for Linux.

The scope of malware that Avira Free AntiVirus can keep you safe from is alone enough to make it one of the best free antivirus software programs but the heuristics and ease of use add to its value too. The only things I didn't like about Avira Free AntiVirus was the configuration you have to complete after installation which might be intimidating if you're a computer novice.
  1. Detects and removes more than 150,000 viruses
  2. Always among the winners of comparison test featured in computer journals
  3. The resident Virus Guard serves to monitor file movements automatically, e.g. downloading of data from the internet
  4. Scanning and repair of macro viruses
  5. Protection against previously unknown macro viruses
  6. Protection against trojans, worms, backdoors, jokes and other harmful programs
  7. AntiVir protection against viruses, worms and Trojans
  8. AntiDialer protection against expensive dialers
  9. AntiRootkit protection against hidden rootkits
  10. AntiPhishing protection against phishing
  11. AntiSpyware protection against spyware and adware
  12. NetbookSupport for laptops with low resolution
  13. QuickRemoval eliminates viruses at the push of a button
  14. Easy operation
  15. Internet-Update Wizard for easy updating
  16. Protection against previously unknown boot record viruses and master boot record viruses
  • Title :   AntiVir  Personal  14.0.3.338
  • File  size :   130.70M B (137,044,488 bytes)
  • Requirements :   Windows  2000  /  XP  /  Vista  /  Windows7  /  XP64  / Vista64 / Windows7 64
  • License :   Non-Commercial  Freeware
  • Date  added :  February 19, 2014
  • Author :  A vi ra GmbH, www.avi ra.com
  • Homepage :  www.avira.com/en/avira-free-antivirus
Official  Link Download :


2. Avast!  Antivirus.


Avast! Free Antivirus is an efficient and comprehensive antivirus program. It is one of the most popular antivirus programs available, thanks to the reliable and trustworthy brand that Avast have created. The key features that continue to make Avast! Free Antivirus so popular are the easy UI, optimized scanning options and continuously updated database of virus definitions.

Simple, improved UI

The 2014 version includes a much simpler and quicker to use UI. Key features can be easily reached in the sidebar and the homepage is now customizable so you can access the tools you use most often directly. The overall appearance is clean and uncluttered, with buttons intuitively labelled and positioned.

Comprehensive Protection

Avast are constantly updating their database of virus definitions, meaning your computer will be protected against the latest spyware, viruses and potentially hazardous websites. Avast’s large and active community quickly alerts the development team of new security threats which are swiftly countered and added to Avast’s significant database. The browser add-on further improves computer security with features like cookie and social tracking blocking.

Speed

Avast! Free Antivirus comes with 5 standard scanning options based on depth and speed. Rapid scan will suffice in most cases - targeting removable media and the files you select, identifying security threats in usually less than a minute. A startup scan will launch automatically on boot up and is a useful, regular security check. The optimized scan engine in the 2014 version means scanning of text content is 10 times faster than previous versions. Scanning of EXE files is around 2 times faster. Improved memory usage means Avast! Free Antivirus should cause less strain on your system so you can continue with other tasks faster.

Summary

Avast! Free Antivirus is definitely one of the best free total security managers available. It is relatively lightweight and efficient, while still providing comprehensive security protection. The browser add on can slow browsing speed and the scanning might not be as detailed as some premium antivirus options. But the simple, effective UI and strong security capabilities make Avast! Free Antivirus a very good choice for those looking for free computer security.
  • Title :  Avast!  Free Antivirus 9.0.2013
  • File size :  86.38M B (90,578,216 bytes)
  • Requirements :   Windows  2000  /  XP  /  Vista  /  Windows7  /  XP64  /Vista64 / Windows7 64 / Windows8 / Windows8 64
  • License :  Non-Commercial  Freeware
  • Date added :  January 23, 2014
  • Author :  Avast Software  :  www.avast.com
  • Homepage :  www.avast.com/free-antivirus-download
Official  Link Download :


3. AVG Antivirus.


AntiVirus Free 2014 from AVG is one of the best free antivirus software tools available and is probably my personal favorite. AVG AntiVirus Free is a full-fledged antivirus and antispyware tool, includes an email scanner, link scanner, scheduled scanning options, automatic updates, and more. There is no need to pay for an antivirus program when one this good is just a download away.

The huge number of premium features, frequency of updating, and install-it-and-forget-it aspect of AVG's AntiVirus Free 2014 really do make it one of the best of the best free antivirus programs available today.

AVG Anti-Virus Free Edition is trusted antivirus and antispyware protection for Windows available to download for free. In addition, the new included LinkScanner® Active Surf-Shield checks web pages for threats at the only time that matters - when you're about to click that link.

AVG Anti-Virus Free has these following features:
  1. Award-winning antivirus and antispyware
  2. Real-time safe internet surfing and searching
  3. Quality proven by 80 million of users
  4. Easy to download, install and use
  5. Protection against viruses and spyware
  6. Compatible with Windows 7, Windows Vista and Windows XP
  • Title :  AVG Free Edition 2014.0.4335
  • File size :  136.60M B (143,231,560 bytes)
  • Requirements :   Windows  2000  /  XP  /  Vista  /  Windows7  /Windows8
  • License :  Freeware
  • Date added :  February 5, 2014
  • Author :  AVG Technologies  :  www.avg.com
  • Homepage :  free.grisoft.com/doc/avg-anti-virus-free/
Official  Link Download :
X -86

X -64


4. BitDefender Antivirus.


Bitdefender Antivirus Free Edition has been designed from ground up towards enabling you to do whatever you enjoy doing most with your computer, while staying 100% safe from e-threats.

Bitdefender uses its own proprietary technologies, while also improving on basic ones which it then integrates for maximum protection.

Features:
  1. Real-time Shield - The real time shield is designed to protect access to the entire system. This means that files are scanned as they are accessed or copied. For example, the files you just downloaded from the Internet are scanned immediately.
  2. Active Virus Control - Active Virus Control is an innovative proactive detection technology that is able to detect new potential threats for which default protection has not yet been released, very fast and accurately, thus providing an essential protection layer.
  3. Intrusion Detection System - This technology makes sure that applications trying to access the Internet or the network are not masked e-threats, by marking them whenever its behavior is suspect and by stopping them if the score becomes high.
  4. B-Have - B-HAVE proactively detects unknown threats that other products miss by analyzing applications behavior in a safe environment. If no malicious actions are detected, B-HAVE starts the program normally; otherwise, it will automatically quarantine or delete it.
  5. HTTP Scanning - Bitdefender Antivirus Free Edition also scans all the links you are accessing from your browser, checking them for various scams or credit card phishing attempts and blocking them when they are unsafe.
  6. Anti-rootkit - This technology is used to scan and block rootkits, a stealthy type of software, often malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer.
  • Title :  Bitdefender Antivirus Free Edition 1.0.21.1099
  • File size :  9.4M B
  • Requirements :  Windows XP / Vista / 7 / 7 64 bit / 8 / 8 64 bit
  • License :  Non-Commercial  Freeware
  • Date added :  October 26, 2013
  • Author :  Bi tdefender LLC
  • Homepage :  www. bi tdefender.com/

Official  Link Download :
X -86
X -64



5. Clam Win Antivirus.


ClamWin is a Free Antivirus program for Microsoft Windows 98/Me/2000/XP/2003 and Vista. ClamWin Free Antivirus comes with an easy installer and open source code. You may download and use it absolutely free of charge. It features:
  1. High detection rates for viruses and spyware;
  2. Scanning Scheduler;
  3. Automatic downloads of regularly updated Virus Database;
  4. Standalone virus scanner and right-click menu integration to Microsoft Windows Explorer;
  5. Addin to Microsoft Outlook to remove virus-infected attachments automatically.
Please note that ClamWin Free Antivirus does not include an on-access real-time scanner. You need to manually scan a file in order to detect a virus or spyware.
  • Title :  ClamWin 0.98.1
  • File size :  86.25M B (90,442,743 bytes)
  • Requirements :  Windows (All  V ersions)
  • License :  Open Source
  • Date added :  February 3, 2014
  • Author :  ClamWin  :  www.clamwin.com
  • Homepage :  www.clamwin.com
Link Download :



6. A-squared Malware Scanner.


Security must not be a privilege. Under this motto, Emsi Software provides the Malware scanner a-squared Free completely free of charge for private use. But it is not a very limited version, it is a full tool to clean your computer from Malware. Not only Spywares, as detected by classic Anti-Spyware programs, but also especially Trojans, Backdoors, Worms, Dialers, Keyloggers and a lot of other destructive pests, which makes it dangerous to surf the web.

Security must not be a privilege. Under this motto, Emsi Software provides the Malware scanner a-squared Free completely free of charge for private use. But it is not a very limited version, it is a full tool to clean your computer from Malware. Not only Spywares, as detected by classic Anti-Spyware programs, but also especially Trojans, Backdoors, Worms, Dialers, Keyloggers and a lot of other destructive pests, which makes it dangerous to surf the web.
The advantages to you:
  1. Frees your PC from Malware
  2. Quarantine for emergency
  3. Exceptionally easy to use
Note: As of July 2010, a-squared Free is no longer developed. Its feature-identical successor is Emsisoft Anti-Malware.
  • Title :  a-squared Free 4.5.0.27
  • File size :  82.40M B (86,402,920 bytes)
  • Requirements :   Windows  XP  /  Vista  /  Windows 7  /  XP 64  /  Vista64  /
  • Windows7 64 / Windows8 / Windows8 64
  • License :  Freeware
  • Date added :  April  22, 2010
  • Author :  Emsi  Software, www.emsisoft.com
  • Homepage :  www.emsisoft.com/en/software/free/
Link Download :


7. Panda Cloud Antivirus


Panda Cloud Antivirus Free 2 protects you from several kinds of malware threats - viruses, worms, Trojans, adware, and more - just like all the other free antivirus programs in this list.

What makes Panda Cloud Antivirus Free 2 one of the best free antivirus programs is that it does its job from "the cloud" meaning the hard antivirus work that typically slows down a computer is done on computers elsewhere on the Internet, freeing up your computer to work like it should and protecting you from malware even better.

Panda Cloud Antivirus Free tries to install a toolbar and change your browser's home page and default search provider during the installation process. Uncheck those boxes before continuing if you don't want them. None of those changes are required to use Panda Cloud Antivirus.
  • Title :  Cloud Antivirus 2.3.0
  • File size :  44.60M B (46,768,304 bytes)
  • Requirements :   Windows  XP  /  Vista  /  Windows7  /  Vista64  / Windows7 64 / Windows8 / Windows8 64
  • License :  Freeware
  • Date added :  October 30, 2013
  • Author :  Panda Security, www.pandasecurity.com
  • Homepage :  www.pandasecurity.com
Link Download :
http://fs35.filehippo.com/6189/3c79aa09738d4c66b9359fead3170e4a/CloudAntivirus.exe


Ranks of combat weapons I have mentioned above is a small portion of your computer's security guard program, there are many other options, please visit the program you have set as well as possible in order to protect your computer to the maximum.

Author : Yohanes Gitoyo.

Selasa, 18 Februari 2014

Baidu PC Faster Foistware (Trojan.Generic.9038304), Parasites The Log Ride Free Program Computer Through Your Favorite!


You've encountered a sudden your computer desktop appears suddenly you need a program that does not / want? programs offer cleaning of temporary files or promise to improve computer performance even tell you that your computer is in danger of malware attacks / computer viruses, so you need to activate / The program update? Hat - heart, your computer is infected Foistware, try to remember if you have previously installed a software? Is it Foistware, dangerous are? Let us learn to know him!



Foistware, unwanted intruders.

Foistware is generally unwanted programs are installed automatically along with other programs, generally a popular freeware. The goal is to foistware instal himself financially benefit from the computer installed and is generally done by way of replacing the default search engines (Google, Bing or other) with search engines foistware affiliated with the manufacturer so that the results of the search ads that do computer users will go into the pockets foistware maker. In its action, prioritizing foistware display of search results the highest paying ad and not prioritizing the accuracy of search results. In many cases foistware directing victims to a site that contains malware and obviously harm the victim. Unfortunately again, this foistware still be languishing on the victim computer even if the host is already in the freeware uninstall and wet like a lizard stuck in the window, a lot of hard foistware uninstalled and requires a special effort to be cast out of the computer. In early action, programs such as Adobe Acrobat, Skype and Java are often boarded foistware. But since getting a lot of complaints from users and the application maker security practitioners began riding program selects and rejects foistware despite their huge potential revenue loss from foistware the ride. Because it happens foistware transfer to another popular freeware from vendors outside the popular freeware application above. One of the very many freeware sites containing foistware is download.com. Some popular foistware is babylon search, search delta, and the last is awesomehp.com Baidu PC Faster by G Data detected as Trojan Generic.9038304 .



Outsmart EULA Dialog Box

Bluestacks Android emulator is a program that allows a computer with a Windows OS to install and run Android applications. This program is very popular and is used by Windows users belonging to the freeware. If you download and install the Bluestacks as done by the laboratory team Vaksincom, most likely you will get other unwanted programs (Foistware) which will come installed along with Bluestacks. One of them was detected by G Data Antivirus Client Security as Trojan.Generic.9038304 (see figure 1) and better known as Baidu PC Faster.

Figure 1, G Data Antivirus detects Baidu PC Faster as Trojan.Generic.9038304

If you are careful enough, at the time of initial installation Bluestacks, strangeness began to appear. Typically, before you install any application potential users must approve the application prior EULA (End User License Agreement) that contains the rights and obligations of the user settings and application developers. Typically, applications that users rarely read the craft slowly EULA completely before clicking the [I Agree] and tend to be instantly approved. Perhaps the reason is that the length of the EULA, which in English legal language and format.

Here Faster PC running one trick where, Baidu PC Faster installation approval together with the approval of the EULA. So if a potential application users agree with the EULA and do a check in the box provided, then automatically he approved of Baidu PC Faster installation so that there is no violation of the law by this Foistware. (See figure 2)

Figure 2, EULA Agreement BlueStacks is installed together with the approval of Baidu PC Faster

After the computer restarts, automatically Baidu PC Faster Application will perform and carry out the action. put himself on the Windows desktop on (see figure 3)

Figure 3, Application Baidu Desktop PC Faster in Windows

You can see this malware temporary files in C: \ Users \ computername \ AppData \ Local \ Temp (see figure 4)

Figure 4, Malware Trojan.Generic.9038304 said Local Temporary

If you are using G Data Antivirus, Baidu PC Faster application is opened, it will be stopped and detected by G Data as Trojan.Generic.9038304, see figure 1 above. Conversely, if your antivirus program to allow this application is running, then you will get a view that is quite interesting as in Figure 5 below.

Figure 5, Display Applications Baidu PC Faster

Faster PC application is actually quite useful, it will monitor the security level of the computer, see if there are vulnerabilities that have not been patched and also make improvements and increase the speed of the computer system. The problem is, aside from the positive function earlier, Baidu PC Faster perform other actions to change the browser / Browser to change the search engine installed on your browser into a search B1. If you use Google's search engine, which display the previous Google Search (http://google.com) will turn into http://search.b1.org. (See figure 6)

Figure 6, the default search engines you will be replaced by B1

When you are trying to find some information he would give favorable results of this malware makers and most likely differ from that given by your default search engine. In comparison Vaksincom lab to search by keyword Download youtube videos (see figure 7)

Figure 7 Comparison of the results with the Google search engine Bi..

The results provided by the search B1 does not provide direct where or how to download you tube videos searched, even display ads that force matched and matched with a keyword search that we do. In this example there are 3 additional ads that appear in connection with the search download youtube videos are mobogenie.com, webcrawler.com and hotelium.com who obviously has nothing to do directly with the download youtube videos. Advertisers will pay money to B1 if the ad is clicked link. As we all know, is a program Mobogenie PUP (Potentially Unwanted Program) http://vaksin.com/2014/0114/mobogenie% 20PUP/mobogenie% 20PUP.html.


Installed Mobogenie

This application will also install an Mobogenie this on your device. (See figure 8)

Figure 8, which is in the Applications Mobogenie installed malware

According to testing conducted by laboratories malware Vaksincom, this application is actually similar to Google Play and in general does not have a malicious payload. However, according to the observations of some malware sites, Mobogenie application for Windows classed as Potentially Unwanted Programs PUPhttp://malwaretips.com/blogs/mobogenie-virus-removal/

Mobogenie has two versions, the version of Windows that can be instalkan on the computer and the version of Android that can only be installed on Android devices. Mobogenie version of Windows that is usually classified PUP menginstalkan join him along with other freeware and in testing conducted by Vaksincom, Mobogenie and Baidu PC Faster you install themselves along with Bluestack freeware program.

Windows Mobogenie most financial benefit using OpenCandy, the Quick Downloader and Conduit bundled with popular freeware. Mobogenie for the PC can be used to transfer images between PCs with smartphones. In many cases computer users who installed Mobogenie not feel install this program and I know it was in the machine. Mobogenie not categorized as virus but it does not have a lot of fun activities / malicious such as rootkits that embed themselves deeply into the operating system so it is very difficult to be uninstalled, browser hijacking and user experience to intervene on his behalf. So more appropriately categorized as PUP Potentially Unwanted Programs.

If you are using Baidu PC Faster and not bothered with the changes made on the search engines, should not be too concerned as long as your system is protected with a good antivirus. But if you want to eliminate Baidu PC Faster from your system, try to follow the steps below.


Removes Baidu PC Faster and Mobogenie of computer

  1. Click [Start], select [Control Panel]
  2. Pilih [Programs and Features] Windows 7 atau [Add or Remove Programs] Windows XP.
  3. Select Baidu PC Faster and double-click to delete or removing Baidu PC Faster (see Figure 9)
  4. Restart computer
Figure 9, Display Baidu PC Faster and Mobogenie in Programs and Features


How to restore the browser settings

To change the look of your browser back to normal, you need to access the settings in your browser. In this example Vaksincom using Google Chrome.

  • Select Settings Extensions by type: chrome :/ / extensions in the address bar and search Google Chrome browser extension with the name Improved Search 1.2 (see figure 10)

Figure 10, which replaces the Extension Improved Search Google Search


  • Eliminate Improved Search 1.2 by clicking on the image bins (remove from Chrome) on the line to the right (see figure 11)

Figure 11, click the trash can to dispose of unwanted Extension


  • Restart browser.

To restore the default search engine to Google (assuming you eingine default search is Google), do the following:
  • Select Settings on the Google Chrome browser by typing: chrome :/ / settings in the address bar. (See figure 12)
  • In Search subpart click the drop down box and select Google.
  • Clicks Done
  • Finish

Figure 12, Setting engines in Browser

  • The default search engine you will get back into Google. (See figure 13)


Figure 13, the default search engine would return to Google

Source : http://vaksin.com/.