Welcome Guest ( Log In | Register )

 
Your Kudos
Your Kudos Ranking --
2 Pages V < 1 2  
Reply to this topicStart new topic
>  Don't want to be infected on a computer virus?
   
 
ringwraith
  Post#31 | Mar 22 2005, 04:44 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
660
Increase this members Kudos



Weapon: Sword
Posts: 2,111
Member No.: 97
Joined: 25-October 04
**************

Here's another one from Trend Micro...

New Type of Virus hits Microsoft Windows Anti spyware

Date: Friday March 18, 2005

Anti spyware Killer - TROJ_ASH.A (Low Risk)
TROJ_ASH.A is a destructive, memory-resident Trojan that terminates and deletes all files related to Microsoft Windows Anti spyware. It also steals information related to online banking Web sites, by monitoring a user's Internet transactions at certain online banking sites. It runs on Windows 95, 98, ME, NT, 2000, and XP.


This memory-resident Trojan arrives in a system as the file ASH.DLL, in the Windows system folder. It may also be downloaded by the user from the Internet. Before installation, the Trojan checks whether Microsoft Windows Anti spyware is installed. If found, it attempts to terminate and delete all files related to this application.

This Trojan steals information related to online banking Web sites, by monitoring the user?s Internet transactions and waiting for the user to access the following online banking sites:

https://ibank.barclays.co.uk
https://ibank.cahoot.com
https://olb2.nationet.com
https://online.lloydstsb.co.uk
https://www.bankofscotlandhalifax-online.co.uk
https://www.ebank.hsbc.co.uk
https://www.ebank.hsbc.co.uk
https://www.millenniumbcp.pt
https://www.ukpersonal.hsbc.com
When the Trojan detects visits to any of these banking sites, it displays a spoofed .HTML page to trick the user into entering their account information. The stolen data is then sent to a remote user.

The Trojan then drops the following log files in the Windows folder, to store the information it gathers from the user:

Email.log
Pass.log
Req.log
In addition to gathering user IDs and passwords, it also gathers email addresses found in the user's system. It gathers email addresses from files with the following extensions:

.*ht*
.adb
.asp
.dbx
.doc
.eml
.msg
.oft
.ph*
.pl*
.rtf
.tbb
.tx*
.uin
.vbs
.wab
.xls
.xml
This Trojan also terminates certain processes, and modifies the HOSTS files. These HOSTS files contain the mappings of IP addresses to host names. This file is loaded into the computer?s memory at startup. Windows checks this file before it connects to a requested Web site. If a requested Web site is listed in the HOSTS file, any attempt to connect to this site is redirected back to the local machine (which is your computer?s IP address). It also blocks other applications from connecting to the Internet, as long the Web site that it attempts to connect to, is listed in the HOSTS file.

HOSTS files are useful for blocking ads, banners, cookies, and known malicious Web sites. However, this technique is now being employed by various malware to prevent users from accessing antivirus and security related Web sites.

This Trojan adds many lines in the system's HOSTS file, preventing a user from accessing the listed Web sites. View the complete list of terminated processes and lines added.


Top 10 Most Prevalent Global Malware
(from March 11 to March 17, 2005)

HTML_NETSKY.P
WORM_NETSKY.P
JAVA_BYTEVER.A
TROJ_SMALL.SN
TROJ_DFC.A
JAVA_BYTEVER.B
SPYW_GATOR.D
TROJ_BAGLE.BG
WORM_RBOT.GEN
TROJ_STARTPA.A



--------------------
 
Neo_Kai
  Post#32 | Mar 22 2005, 07:18 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
0
Increase this members Kudos



Playing: LOTR BFME II
Weapon: Water Pistol
Posts: 332
Member No.: 1,163
Joined: 25-February 05
******

that Trojin crap
 
20--jamesy--07
  Post#33 | Mar 27 2005, 19:45 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
620
Increase this members Kudos



Playing: GTA IV 48.99%
Weapon: Slingshot
Posts: 775
Member No.: 35
Joined: 23-October 04
*********

this is from another topic


QUOTE(wite_gangsta @ Mar 24 2005, 06:09 )
many people might Know this but...

    If someone sends you a file on msn which is called "john Kerry as super chicken" DO NOT ACCEPT. Its a virus. It has already infected me.

1.Everytime you go in msn all conversation windows open automatically and you send the virus to everyone and it opens the C: folder like 5 times.

2. It stuffs up your mouse buttons like which it has done to me  fury.gif  It makes the left mouse button to the right and vice versa. It fades off in a while though.

3. It installs many things into your local disk  (c:) file which opens many times in when you have the computer on.

4. It locks your X button on msn convos once in a while.

5. It makes your sending files or attatchment stuff up like flash.

I dont know other things it infects but its so annoying. You cannot delete it because it comes back straight away. do not double clik on any files it downloads onto your computa. BELIEVE ME. All of the above happen once every 10 to 20 minutes or less if your not careful.

Does anyone know how to get rid of this msn virus or any other viruses on my computer. I remember my cousin sending my dad "how to delete a virus" in search or sumtin. BEWARE.
*




--------------------
IPB Image
 
ringwraith
  Post#34 | Mar 30 2005, 04:24 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
660
Increase this members Kudos



Weapon: Sword
Posts: 2,111
Member No.: 97
Joined: 25-October 04
**************

From Trend Micro

New Jeans - WORM_JEANS.A (Low Risk)
WORM_JEANS.A is a memory-resident worm that attempts to propagate via email with itself as an attachment, using its own Simple Mail Transfer Protocol (SMTP) engine. It may use a polymorphic engine to drop a file containing the source code of the worm, and then recompile it to produce a different appearance. While the inclusion of source code in the worm is not new behavior (BAGLE variants included this), the recompilation of the dropped source code is. This "courier virus" behavior is described as the worm being able to carry within itself, its whole source code and eventually dropping and recompiling it in the infected computer to create new variants of itself. It infects computers running Windows 98, ME, NT, 2000, and XP.

Upon execution, the worm drops a copy of itself as INCUBATOR.SCR in the Windows folder or BIGFISH.SCR in the Windows system folder. It creates registry entries that allow it to automatically execute at every system startup. It also adds registry entries such that when certain applications are executed, this worm runs instead of the programs selected.

This worm attempts to propagate via email. It searches for target email addresses in files with the following file name extensions:

.asp
.htm
.xml
It retrieves SMTP servers in the system registry, and then attempts to send a copy of itself as an attachment using its own SMTP engine. The email message that it attempts
to send, contains the following details (however, due to bugs in its code, this worm is not able to execute this propagation routine):

From: Don Quijote y Sancho Panza

Subject: juas juas cuidadin con el attachhhhrrrr!!!!!

Message body: juas juas juas peaso de bicho que lleva el attach!!! juas juas!!! ;D
Vallez\29a

Attachment: soyunpeasodebichooooooo.scr

This worm may also display a message box with the following:

Win32.Genome coded by ValleZ/29a


--------------------
 
ringwraith
  Post#35 | Apr 8 2005, 14:44 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
660
Increase this members Kudos



Weapon: Sword
Posts: 2,111
Member No.: 97
Joined: 25-October 04
**************

From Trend Micro

Like Kryptonite? - WORM_KRYNOS.B (Low Risk)

WORM_KRYNOS.B is a destructive, memory-resident worm that propagates via peer-to-peer applications by dropping a .ZIP copy of itself in a certain folder. It may also spread via email by sending itself as an attachment. This worm has backdoor capabilities, allowing remote users to access and perform malicious tasks on affected machines. It can also prevent affected users from accessing certain antivirus and security Web sites by modifying the HOSTS file. WORM_KRYNOS.B is currently spreading in-the-wild, and infecting computers running Windows NT, 2000, and XP.

Upon execution, this memory-resident worm drops the following files in the Windows folder:

%Windows%\Help\svchost.dat
%Windows%\Help\svchost.exe
%Windows%\Help\svchost.lce
It then displays the following message:
Can't open mfc73rp.dll

It creates a registry entry that allows it to automatically execute the dropped file svchost.exe at every system startup.

This worm propagates via P2P applications by making a .ZIP copy of itself in a specific folder -- the file name depends on the names of the currently saved files in that folder.

The worm may also propagate by sending itself as an attachment to an email message. It searches files with the extensions HTM and TXT for target email addresses. However, it first queries www.google.com to check for an Internet connection, before it sends the email.

The email it sends contains the following details:

From: security@microsoft.com

To: (recipient email address harvested from affected system)

Subject: Microsoft Security Update

Message body:
* "Vulnerability in Windows Explorer Could Allow Remote Code Execution (612827)"
Affected Software:
* Impact of Vulnerability: Remote Code Execution
* Importance: High
* Maximum Severity Rating: Critical
* Recommendation: Customers should apply the attached update at the earliest opportunity
* Summary:
* Who should read this document: Customers who use Microsoft Windows
* X-Mailer: Secure Microsoft Client, Build 2.1
* X-MimeOLE: Produced By Secure Microsoft Client V2.1
* X-MSMail-Priority: High
* X-Priority: 1 (Highest)

Attachment:
* ARC
* ARJ
* GZ
* LZH
* TGZ
* ZIP
* ZOO

The worm avoids worm avoids sending email to addresses containing certain strings. View the complete list of strings.

The following backdoor capabilities are enabled by the worm:

Get, upload, download, or delete a file
List files in a folder
Disconnect current user
Restart the system
Run a program
Create or delete a folder

This worm also modifies the system's HOSTS, which contains the host name to IP address mappings. This modification prevents affected users from accessing specific sites related to antivirus companies.


--------------------
 
20--jamesy--07
  Post#36 | Apr 12 2005, 16:24 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
620
Increase this members Kudos



Playing: GTA IV 48.99%
Weapon: Slingshot
Posts: 775
Member No.: 35
Joined: 23-October 04
*********

just thought i would put the solution here lol


Solution:




Identifying the Malware Program

To remove this malware, first identify the malware program.

Scan your system with your Trend Micro antivirus product.
NOTE all files detected as WORM_KRYNOS.B.
Trend Micro customers need to download the latest pattern file before scanning their system. Other users can use Housecall, Trend Micro?s online virus scanner.

Terminating the Malware Program

This procedure terminates the running malware process. You will need the name(s) of the file(s) detected earlier.

Open Windows Task Manager. To do this, press
CTRL+SHIFT+ESC, then click the Processes tab.
In the list of running programs*, locate the malware file(s) detected earlier.
Select one of the detected files, then press either the End Task or the End Process button, depending on the version of Windows on your system.
Do the same for all detected malware files in the list of running processes.
To check if the malware process has been terminated, close Task Manager, and then open it again.
Close Task Manager.
Removing Autostart Entries from the Registry

Removing autostart entries from the registry prevents the malware from executing at startup.

Open Registry Editor. Click Start>Run, type REGEDIT, then press Enter.
In the left panel, double-click the following:
HKEY_LOCAL_MACHINE>Software>Microsoft>
Windows>CurrentVersion>Run
In the right panel, locate and delete the entry:
Microsoft Service Host Process = "%Windows\Help\svchost.exe"
(Note: %Windows% is the default Windows folder, usually C:\Windows or C:\WINNT.)
Close Registry Editor.

--------------------------------------------------------------------------------
NOTE: If you were not able to terminate the malware process as described in the previous procedure, restart your system.
Enabling Show All Files

This procedure allows you to access hidden malware files using Windows Explorer.

╗ On Windows NT

Open Windows Explorer. Right-click Start then click Explore.
On the View menu, click Options or Folders Options.
Click the View tab.
Select Show all files, then click OK.

╗ On Windows 2000 and XP

Open Windows Explorer. Right-click Start then click Explore.
On the Tools menu, click Folder Options.
Click the View tab.
Select Show hidden files and folders, then click OK.

Removing Malware Entries from the HOSTS File

Deleting malware entries from the HOSTS file removes all malware-made changes on host name association.

Open the following file using a text editor (such as NOTEPAD):
%System%\drivers\etc\HOSTS
%Windows%
(Note: %System% is the Windows system folder, which is usually C:\WINNT\System32 on Windows NT and 2000, and C:\Windows\System32 on Windows XP. %Windows% is the Windows folder, which is usually C:\Windows or C:\WINNT.)
Delete the following entries:
127.0.0.1 avp.com
127.0.0.1 ca.com
127.0.0.1 customer.symantec.com
127.0.0.1 dispatch.mcafee.com
127.0.0.1 download.mcafee.com
127.0.0.1 f-secure.com
127.0.0.1 kaspersky.com
127.0.0.1 liveupdate.symantec.com
127.0.0.1 liveupdate.symantecliveupdate.com
127.0.0.1 mast.mcafee.com
127.0.0.1 mcafee.com
127.0.0.1 my-etrust.com
127.0.0.1 nai.com
127.0.0.1 networkassociates.com
127.0.0.1 rads.mcafee.com
127.0.0.1 secure.nai.com
127.0.0.1 securityresponse.symantec.com
127.0.0.1 sophos.com
127.0.0.1 symantec.com
127.0.0.1 trendmicro.com
127.0.0.1 update.symantec.com
127.0.0.1 updates.symantec.com
127.0.0.1 us.mcafee.com
127.0.0.1 viruslist.com
127.0.0.1 viruslist.com
127.0.0.1 www.avp.com
127.0.0.1 www.ca.com
127.0.0.1 www.f-secure.com
127.0.0.1 www.kaspersky.com
127.0.0.1 www.mcafee.com
127.0.0.1 www.my-etrust.com
127.0.0.1 www.nai.com
127.0.0.1 www.networkassociates.com
127.0.0.1 www.sophos.com
127.0.0.1 www.symantec.com
127.0.0.1 www.trendmicro.com
127.0.0.1 www.viruslist.com
Save the file and close the text editor.
Additional Windows XP Cleaning Instructions

Users running Windows XP must disable System Restore to allow full scanning of infected systems.

Users running other Windows versions can proceed with the succeeding procedure sets.

Running Trend Micro Antivirus

Scan your system with Trend Micro antivirus and delete all files detected as WORM_KRYNOS.B. To do this, Trend Micro customers must download the latest pattern file and scan their system. Other Internet users can use HouseCall, Trend Micro?s online virus scanner.





Trend Micro offers best-of-breed antivirus and content-security solutions for your corporate network, small and medium business or home PC.



This post has been edited by Ryder: Apr 12 2005, 16:53


--------------------
IPB Image
 
MachineGunFunk
  Post#37 | Apr 13 2005, 19:12 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
0
Increase this members Kudos

Playing: BrainBread, k?
Weapon: Water Pistol
Posts: 330
Member No.: 36
Joined: 23-October 04
******

I started up my computar today and an norton window poped up saying this:

"Norton internet worm protection detected and blocked an invasion try"

The name of the trojan that norton detected is : Default Block Bla Trojan Horse.


--------------------
This is not a signature.
 
Bounkass
  Post#38 | Jan 26 2006, 13:53 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
410
Increase this members Kudos



Playing: Rubik's Cube
Weapon: Spear
Posts: 1,751
Member No.: 541
Joined: 12-December 04
*************

MSN Messenger Beta 8.0 is a virus too, ignore it!!! yes.gif
 
Shof
  Post#39 | Jan 26 2006, 20:58 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
1590
Increase this members Kudos



Playing: Music
Weapon: Uzi
Posts: 4,824
Member No.: 1,515
Joined: 10-April 05
*******************

..depends where you get it from
 
Waffler
  Post#40 | Jan 26 2006, 21:23 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
670
Increase this members Kudos



Playing: With Your C:/ Drive
Weapon: Rock
Posts: 647
Member No.: 50
Joined: 23-October 04
********

Bounkass why did you BUMP a topic from a year ago?


--------------------
IPB Image
 
JosephO75
  Post#41 | Jan 26 2006, 23:20 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
1350
Increase this members Kudos



Playing: with everyone's mind
Weapon: Pistol
Posts: 3,097
Member No.: 2,942
Joined: 27-August 05
****************

I got an IM saying "Hey, look at my pics and rate me. ;)" as a hyperlink. I hovered my mouse over the link, and I saw that it had all these "/blahblah/b;ahblah/something/somethingelse/...", and then I saw it ended with ".exe". So yeah, don't rate anybody when they IM you on AIM and say "Hey, look at my pics and rate me. ;)".

Also, a couple years ago, I saw in one of my friends profiles, it said "Are you a real friend of mine?" as a link. So as dumb as I was, I didn't look to see where it would go first. But I clicked it, and it went to the site, but it was just a white page. I thoguht "Geez, it's going slow again..." because I had dial-up back then. Then 5 seconds later, my away message comes up saying "Are you a real friend of mine?". I clicked "I'm Back", then 5 seconds later, it came up again.

btw: This was when there wasn't "Allow Sending Of Messages".

For me, the easiest way to get rid of AIM viruses is to just uninstall AIM, then download it again. Make sure you save your buddy list and such. wink.gif

This post has been edited by JosephO75: Jan 26 2006, 23:22


--------------------
 
Bounkass
  Post#42 | Jan 27 2006, 11:52 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
410
Increase this members Kudos



Playing: Rubik's Cube
Weapon: Spear
Posts: 1,751
Member No.: 541
Joined: 12-December 04
*************

@ the "waffler": Why did you reply in this topic? gun.gif
 
20--jamesy--07
  Post#43 | Jan 27 2006, 15:19 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
620
Increase this members Kudos



Playing: GTA IV 48.99%
Weapon: Slingshot
Posts: 775
Member No.: 35
Joined: 23-October 04
*********

QUOTE(The "waffler" @ Jan 26 2006, 21:23 )
Bounkass why did you BUMP a topic from a year ago?
*


DUDE does it really matter this is a topic for VIRUS WARNINGS even if it was made a yr ago u can still reply in it


--------------------
IPB Image
 
Ephonetica
  Post#44 | Feb 1 2006, 10:12 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
2200
Increase this members Kudos



Weapon: Magnum
Posts: 3,912
Member No.: 8
Joined: 13-October 04
*****************

QUOTE(Bounkass @ Jan 26 2006, 14:53 )
MSN Messenger Beta 8.0 is a virus too, ignore it!!! yes.gif
*


I've seen lots of bullsh*t posts since I first joined a forum in '02, but this strikes all. /me nominates this one as dumbest post of the first half of '06.


--------------------
IPB Image

bad as ass.
 
don goyo
  Post#45 | Apr 11 2006, 12:24 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
70
Increase this members Kudos

Playing: with the Law
Weapon: Water Pistol
Posts: 352
Member No.: 4,040
Joined: 26-December 05
******

i┤m not sure if this should be here:
i received an email from someone i dont know, whose name doesnt seem english, talking about a free gift, and with a link. there was a warning saying that the sender could not be checked by his ID (or something like that).

De: sarasenovilla@msn.com using getitfree.net <sarasenovilla@msn.com>
Enviado el: Tuesday, April 11, 2006 3:45:18 AM
Para: g_amarante@hotmail.com
Asunto: please do this, for a free gift

| | | Bandeja de entrada



hey, go here and we both get a free {$lowercase_gift_name}

pretty pretty please : )


http://ww w.getitfree.net/xflutzqni[ <--that was the link, don┤t try i suggest. i changed it so that it doesn┤t appear as a link]







This was sent by sarasenovilla@msn.com via GetItFree, 540 University Ave 50, Palo Alto CA 94301
Visit this page to prevent delivery of future GetItFree.net referral emails


^wtf is this sh*t?

This post has been edited by don goyo: Apr 11 2006, 12:28


--------------------
IPB Image
Cannabis sativa & Cannabis indica are endangered species. Don┤t let them become extinct.
 
JosephO75
  Post#46 | Apr 11 2006, 22:04 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
1350
Increase this members Kudos



Playing: with everyone's mind
Weapon: Pistol
Posts: 3,097
Member No.: 2,942
Joined: 27-August 05
****************

QUOTE(don goyo @ Apr 11 2006, 08:24 )
i┤m not sure if this should be here:
i received an email from someone i dont know, whose name doesnt seem english, talking about a free gift, and with a link. there was a warning saying that the sender could not be checked by his ID (or something like that).

De:  sarasenovilla@msn.com using getitfree.net <sarasenovilla@msn.com>
Enviado el:  Tuesday, April 11, 2006 3:45:18 AM
Para:  g_amarante@hotmail.com
Asunto:  please do this, for a free gift
 
  |  |  | Bandeja de entrada



hey, go here and we both get a free {$lowercase_gift_name}

pretty pretty please : )
http://ww w.getitfree.net/xflutzqni[ <--that was the link, don┤t try i suggest. i changed it so that it doesn┤t appear as a link]
This was sent by sarasenovilla@msn.com via GetItFree, 540 University Ave 50, Palo Alto CA 94301
Visit this page to prevent delivery of future GetItFree.net referral emails 


^wtf is this sh*t?
*




i get those types of e-mails all the time... dry.gif


--------------------
 
dtneter
  Post#47 | May 18 2006, 13:44 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
0
Increase this members Kudos

Playing: mercenaries
Weapon: Balloon
Posts: 38
Member No.: 120
Joined: 26-October 04
*

o yea btw never go to ?ex sites you dont trust if you go you should better scan your pc afterwards. and clean it up like cleaning the temp folders example:
C:\Documents and Settings\your name\Local Settings\Temporary Internet Files\Content.IE5.
or remove the content.IE5 to look at the whole sh|t.


--------------------
And remember, respect is everything.
 
Magnum
  Post#48 | Aug 30 2006, 19:53 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
1620
Increase this members Kudos

Playing: San Andeas
Weapon: Sword
Posts: 2,055
Member No.: 284
Joined: 7-November 04
**************

I just got this one:

Downloader

Don't visit keygenerator sites!!!


This post has been edited by Magnum 0.5: Aug 31 2006, 09:36


--------------------
"Those parties that have no healer are f*cked!" (HUNMagnum-Last Chaos)
IPB Image
IPB Image
 
Shof
  Post#49 | Aug 30 2006, 21:33 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
1590
Increase this members Kudos



Playing: Music
Weapon: Uzi
Posts: 4,824
Member No.: 1,515
Joined: 10-April 05
*******************

1) Resize the screenshot
2) Update norton and use something like 2006 not 2004
 
Magnum
  Post#50 | Aug 30 2006, 21:40 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
1620
Increase this members Kudos

Playing: San Andeas
Weapon: Sword
Posts: 2,055
Member No.: 284
Joined: 7-November 04
**************

It had been updated yesterday... it found and automatically deleted the virus... so no problem. smile.gif


--------------------
"Those parties that have no healer are f*cked!" (HUNMagnum-Last Chaos)
IPB Image
IPB Image
 
::PCDevil::
  Post#51 | Jun 4 2007, 15:15 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
300
Increase this members Kudos



Playing: With My Johnson :D
Weapon: Elastic Band
Posts: 100
Member No.: 7,184
Joined: 3-January 07
***

ContraVirus is a virus, look at the screeny here:

IPB Image

It says that its a malware/spyware remover, once installed it detects spyware even on a clean machine, and you have to buy it to remove it

Dont download


--------------------
IPB Image

QUOTE(Sig)

That is, if you can find them, because they are very small.
Atleast there chocolate
 
Shof
  Post#52 | Jun 4 2007, 23:18 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
1590
Increase this members Kudos



Playing: Music
Weapon: Uzi
Posts: 4,824
Member No.: 1,515
Joined: 10-April 05
*******************

wow. Things are getting very bad, yet they are become easier to trick newbies
 
Nutter
  Post#53 | Jun 5 2007, 00:50 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
670
Increase this members Kudos



Playing: Video Games
Weapon: Slingshot
Posts: 815
Member No.: 7,016
Joined: 16-December 06
*********

You guys should get the Norton Anti-Virus Spy Ware Program.Everyday,it scans every file you have for viruses and it deletes it for you.


--------------------
Eddie Knox rocks my socks at the Games Unleashed Network.
 
Shof
  Post#54 | Jun 5 2007, 01:47 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
1590
Increase this members Kudos



Playing: Music
Weapon: Uzi
Posts: 4,824
Member No.: 1,515
Joined: 10-April 05
*******************

QUOTE(GU Girl @ Jun 4 2007, 20:50 ) *

You guys should get the Norton Anti-Virus Spy Ware Program.Everyday,it scans every file you have for viruses and it deletes it for you.

Why? They are other free programs that does the same
 
Nutter
  Post#55 | Jun 5 2007, 16:26 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
670
Increase this members Kudos



Playing: Video Games
Weapon: Slingshot
Posts: 815
Member No.: 7,016
Joined: 16-December 06
*********

Other programs don't work as well as this one.


--------------------
Eddie Knox rocks my socks at the Games Unleashed Network.
 
Shof
  Post#56 | Jun 6 2007, 00:04 + Quote Post Go to the top of the page
User is offline
Mini Profile
PM
1590
Increase this members Kudos



Playing: Music
Weapon: Uzi
Posts: 4,824
Member No.: 1,515
Joined: 10-April 05
*******************

QUOTE(GU Girl @ Jun 5 2007, 12:26 ) *

Other programs don't work as well as this one.

What proof do you have that atleast states/proves your statement? Please read reviews and other artciles on the following programs:
Ad Aware
Spybot
 
1 User(s) are reading this topic:
 
 
2 Pages V < 1 2
Reply to this topicStart new topic
 
 
 
- Choose Skin: