SysChat is a free online computer support community. Ask questions, share resources, contribute knowledge and discuss technology. Join our growing community to access all features. Register Now!

SysChat » Tutorials » Security

Security

Guides and tutorials on computer security, antivirus, antispyware, malware, parental control, and privacy protection

Post New Tutorial
Tutorials in Category : Security Category Tools Search this Category
Sticky Thread How to Detect and Remove Trojan.Win32.Agent.azsy

The Trojan.Win32.Agent.azsy program is one of the newer variants of the Trojan.Win32.Agent malware group. It penetrates systems through flaws in firewalls and small security vulnerabilities.... Read more
Views Last Activity
9,047 07-03-2009 08:21 AM by KarlM Go to last post
 
Sticky Thread Secure your computer from viruses and spyware for free
By Sajid

One of the hazards of using a computer online today is the danger of infestation with a variety of malware, viruses, trojan horses, spyware.
Views Last Activity
19,186 05-15-2007 08:47 PM by Unregistered Go to last post
 
A Basic Guide To Internet Security
by John Rivers

The internet is a wonderful place; many of us use it on a regular basis for a multitude of functions.
Views Last Activity
2,731 02-20-2006 12:22 AM by Sami Go to last post
 
About Malware Bell and Removal Instructions

This particular application refers to fake anti-spyware software developed by malwarebell.com. The Malware Bell presents itself as a threat removal tool, but generally causes trouble to the affected... Read more
Views Last Activity
2,581 06-30-2009 11:25 PM by DanielGray Go to last post
 
Autorun.ITA is also known as W32/Autorun.ITA

The Autorun.ITA is also known as W32/Autorun.ITA. This type of virus can severely damage a contaminated system. It propagates in stealth mode in order to shun away from users and... Read more
Views Last Activity
2,434 09-18-2009 04:53 AM by DanielGray Go to last post
 
BBHK Spyware Trojan info and removal

The BBHK Trojan refers to a spyware and downloader that may contaminate Windows XP, and Vista Operating System. This kind of program is bundled with some freeware programs or installed through... Read more
Views Last Activity
2,220 06-16-2009 05:45 AM by DanielGray Go to last post
 
Computer Safety for Kids
Rob Pirozzi

Start With the Basics - Protect Your PC
Guarding Access to Your PC - Get a Firewall
Views Last Activity
5,348 11-22-2006 02:29 AM by Sami Go to last post
 
Crusader Antivirus Manual Removal: Windows XP and Vista

Crusader Antivirus is a counterfeit program which presents itself as an antivirus application. It was developed by a company named RITAX Limited Software, and is identical to the AGAVA... Read more
Views Last Activity
2,596 05-29-2009 08:25 AM by KarlM Go to last post
 
Debunking Some Common Computer Security Myths
By U.S. CERT Cyber Security Alert, Mindi McDowell

There are some common myths that may influence your online security practices. Knowing the truth will allow you to make better decisions about how to protect yourself.
Views Last Activity
2,096 02-24-2006 09:10 PM by Sami Go to last post
 
Effects and Removal of Back Orifice

A Back Orifice virus was created by CDC (Cult of the Dead Cow). It permits a remote system to manipulate the infected Windows computer using the GUI or console application. The remote user... Read more
Views Last Activity
2,904 06-30-2009 10:22 PM by DanielGray Go to last post
 
Ettercap, a powerful tool to avoid “Man In The Middle Attack”

Ettercap is a tool made by Alberto Ornaghi (ALoR) and Marco Valleri (NaGA) and provides a suite for man in the middle attacks on a LAN. It comes with both Command like Interface (CLI) and... Read more
Views Last Activity
7,549 04-26-2010 01:52 PM by metal333 Go to last post
 
Fast Antivirus 2009 Manual Removal: Windows XP and Vista

Fast Antivirus 2009 (which is also known as FastAntivirus2009), is yet another bogus software disguised as an anti-spyware application. It originates from the same group as Virus Shield 2009... Read more
Views Last Activity
4,877 05-23-2009 09:44 AM by KarlM Go to last post
 
Good Security Habits
Mindi McDowell, Allen Householder

There are some simple habits you can adopt that, if performed consistently, may dramatically reduce the chances that the information on your computer will be lost or corrupted.
Views Last Activity
2,206 03-07-2006 11:41 PM by Sami Go to last post
 
How Adware is bad for your PC... and how to get rid of it once and for all!

You download a nice P2P program and with it some software you don’t know. You don’t even bother researching it on the net. Then you work pleasantly on your PC, only to find something popping up... Read more
Views Last Activity
2,598 01-20-2009 01:18 AM by squirrelnmoose Go to last post
 
How to avoid and remove Spyware.CyberLog-X

This type of threat is one of the recent scamware discovered in Mainland China. The Spyware.CyberLog-X has the possibility to contaminate executable files. According to some reports, it can... Read more
Views Last Activity
2,040 06-19-2009 01:09 AM by DanielGray Go to last post
 
How to Avoid Neospace Internet Security Infections

This application is a false security scan usually offered for free on the internet. It pretends to detect malware form the user computer and later informs the user that it is incapable of... Read more
Views Last Activity
2,029 06-11-2009 09:59 PM by DanielGray Go to last post
 
How to check if files contain viruses before downloading from the Internet

How many times have downloaded files from the Internet? Probably often. For work, hobby, passion, etc. Wouldn't it be nice to know if the file you're downloading has a virus even before they... Read more
Views Last Activity
3,066 11-05-2009 01:53 AM by dwarkarao Go to last post
 
How to Detect and Remove Email-Worm.Win32.Merond.a

One of the newest forms of malware doing the rounds is Email-Worm.Win32.Merond.a. This is an email worm that commonly comes as an attachment with infected emails. It also spreads itself... Read more
Views Last Activity
8,719 07-03-2009 08:19 AM by KarlM Go to last post
 
How To Exclude Paths in McAfee Antivirus?

If you still face problems with your McAfee Antivirus, call PCCare247 for quick and complete resolution. Finding answer to all your computer problems is a child’s play for PCCare247 experts.
Views Last Activity
3,333 09-15-2012 12:19 AM by PCCare247 Go to last post
 
How to Remove & Avoid Trojan-Downloader.Win32.Small.cqf Infection

The Trojan-Downloader.Win32.Small.cqf refers to is a Win32 Trojan that communicates and access the Internet via HTTP. The Trojan-Downloader.Win32.Small.cqf installs its files within the... Read more
Views Last Activity
4,178 06-07-2009 08:31 AM by DanielGray Go to last post
 
How to Remove CoolWebSearch Malware

BHO (Browser Helper Object)
Views Last Activity
3,458 06-05-2009 06:38 AM by DanielGray Go to last post
 
How to Remove Home Antivirus 2010

The Home Antivirus 2010 application is a variant of the bogus anti-spyware program WinReanimator. It infiltrates systems through Trojans such as Trojan-Downloader.braviax, or views... Read more
Views Last Activity
8,853 10-03-2012 05:53 AM by PCCare247 Go to last post
 
How to remove SpyLocked

SpyLocked is a rogue anti-spyware, which is also known as Spywarelocked, is installed by Zlob Trojans. It camouflages its files as an audio or video codec and needs to be downloaded by the user... Read more
Views Last Activity
1,946 06-19-2009 01:06 AM by DanielGray Go to last post
 
How to Remove the Raila Odinga Virus

What is the Raila Odinga Virus? The Raila Odinga virus causes this pop-up to appear: “Vote Raila Odinga, the Hummer (Nyundo) for President 2007.” All infected machines have the... Read more
Views Last Activity
14,748 04-01-2009 10:30 AM by lurkswithin Go to last post
 
How to Remove the Recycler Virus

The Recycler virus is malicious code that originated from the worm W32.Lecna.H. It infiltrates a computer system through the Windows Autorun feature. The virus enters via permanent media, as... Read more
Views Last Activity
40,565 11-08-2009 11:07 PM by jubert Go to last post
 
How to Verify the Security of File Downloads with FCIV (SHA1SUM)
Have you ever waited for a large file to download overnight, sometimes even pausing and resuming for days, only to find out in the end that the large

Each file on your computer can its own unique "fingerprint" and can be identified as unique even if it was saved along usb flashdrives, or sent via email, or even distributed via file... Read more
Views Last Activity
7,833 02-28-2014 07:30 AM by DominicD Go to last post
 
Hupigon ip139 removal instructions

The Hupigon ip139 Trojan refers to an application that permits a remote user to gain entrée to the target system. Its backdoor function is an executable file packed using UPX. This type of... Read more
Views Last Activity
2,587 06-08-2009 04:05 AM by DanielGray Go to last post
 
Hyperjacking - Future Computer Server Threat

The Hyperjacking is one of the latest threats to computer servers. Since phishing and virus attacks now outdated, hackers are now trying to perform a new malicious execution,... Read more
Views Last Activity
5,758 09-02-2009 12:09 AM by DanielGray Go to last post
 
Infection Types to the Computer System

In the present scenario of technology, computers play the most significant role. Whether you are working in an income tax department, a private firm or any of the other organization, storing data on... Read more
Views Last Activity
3,642 05-03-2008 08:14 AM by Andrew Watson Go to last post
 
Insurrection 1.0 Malware: Windows XP

The Insurrection is categorized as a backdoor spyware, it records the log in of a user and searches for vital information. It catches the keystrokes in real time, the data it is able to fetch... Read more
Views Last Activity
1,884 06-03-2009 11:23 PM by DanielGray Go to last post
 
Keep Your Passwords Safe on Public Use Computers
by G.L. Bailey

As you no doubt realize, passwords are the keys to our resources, our belongings and our online accounts, including our finances.
Views Last Activity
2,059 02-28-2006 12:34 AM by Sami Go to last post
 
Malicious Programs - Prevention Is Much Easier than the Cure
James Hurst

This article briefly explains how most computer viruses compromise vulnerable computers and how you can make your computer and valuable data much less vulnerable to a malicious executable or... Read more
Views Last Activity
3,229 12-05-2006 02:52 AM by Sami Go to last post
 

10 most read tutorials
Post New Tutorial

Display Options Moderators
Showing reviews 1 to 30 of 50 Moderators : 3
Sorted By Sort Order
From The
Category Tools Search this Category
Search this Category :

Advanced Search

New posts New posts More than 20 replies or 1000 views Hot tutorial with new posts
No new posts No new posts More than 20 replies or 1000 views Hot tutorial with no new posts
Closed Tutorial Thread is closed  
 
Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is on
Smilies are on
[IMG] code is on
HTML code is Off


» Ads



1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54