SysChat is a free online computer support community. Ask questions, share resources, contribute knowledge and discuss technology. Join our growing community to access all features. Register Now!

SysChat » Tutorials » Security

Security

Guides and tutorials on computer security, antivirus, antispyware, malware, parental control, and privacy protection

Post New Tutorial
Tutorials in Category : Security Category Tools Search this Category
Sticky Thread Secure your computer from viruses and spyware for free
By Sajid

One of the hazards of using a computer online today is the danger of infestation with a variety of malware, viruses, trojan horses, spyware.
Views Last Activity
23,059 05-15-2007 08:47 PM by Unregistered Go to last post
 
Sticky Thread How to Detect and Remove Trojan.Win32.Agent.azsy

The Trojan.Win32.Agent.azsy program is one of the newer variants of the Trojan.Win32.Agent malware group. It penetrates systems through flaws in firewalls and small security vulnerabilities.... Read more
Views Last Activity
11,132 07-03-2009 08:21 AM by KarlM Go to last post
 
How to Remove the Raila Odinga Virus

What is the Raila Odinga Virus? The Raila Odinga virus causes this pop-up to appear: “Vote Raila Odinga, the Hummer (Nyundo) for President 2007.” All infected machines have the... Read more
Views Last Activity
17,305 04-01-2009 10:30 AM by lurkswithin Go to last post
 
How Adware is bad for your PC... and how to get rid of it once and for all!

You download a nice P2P program and with it some software you don’t know. You don’t even bother researching it on the net. Then you work pleasantly on your PC, only to find something popping up... Read more
Views Last Activity
4,254 01-20-2009 01:18 AM by squirrelnmoose Go to last post
 
How to Remove the Recycler Virus

The Recycler virus is malicious code that originated from the worm W32.Lecna.H. It infiltrates a computer system through the Windows Autorun feature. The virus enters via permanent media, as... Read more
Views Last Activity
43,537 11-08-2009 11:07 PM by jubert Go to last post
 
How to Remove Home Antivirus 2010

The Home Antivirus 2010 application is a variant of the bogus anti-spyware program WinReanimator. It infiltrates systems through Trojans such as Trojan-Downloader.braviax, or views... Read more
Views Last Activity
11,578 10-03-2012 05:53 AM by PCCare247 Go to last post
 
The best approach to removing spyware from your Pc

It’s always a good thing to work on the final removal of all Spyware from your computer, but how do u know that you have Spyware? And how do you remove it?
Views Last Activity
5,425 01-21-2008 02:55 PM by Sajid Go to last post
 
Why spyware scanners are better than normal antivirus software

Spyware scanners an effective way to get rid of spyware and adware
Views Last Activity
5,369 01-21-2008 03:02 PM by Sajid Go to last post
 
Infection Types to the Computer System

In the present scenario of technology, computers play the most significant role. Whether you are working in an income tax department, a private firm or any of the other organization, storing data on... Read more
Views Last Activity
5,365 05-03-2008 08:14 AM by Andrew Watson Go to last post
 
How to Remove CoolWebSearch Malware

BHO (Browser Helper Object)
Views Last Activity
5,287 06-05-2009 06:38 AM by DanielGray Go to last post
 
W32.Aspam.Trojan.B: Description, Effects, and Removal.

W32.Aspam.Trojan.B refers to a spyware and a BHO (Browser Helper Object) that can contaminate Windows 98, XP, and Vista. It disguises its files as Anti-Spyware software from Microsoft. ... Read more
Views Last Activity
4,142 06-06-2009 01:47 AM by DanielGray Go to last post
 
How to Remove & Avoid Trojan-Downloader.Win32.Small.cqf Infection

The Trojan-Downloader.Win32.Small.cqf refers to is a Win32 Trojan that communicates and access the Internet via HTTP. The Trojan-Downloader.Win32.Small.cqf installs its files within the... Read more
Views Last Activity
5,825 06-07-2009 08:31 AM by DanielGray Go to last post
 
Hupigon ip139 removal instructions

The Hupigon ip139 Trojan refers to an application that permits a remote user to gain entrée to the target system. Its backdoor function is an executable file packed using UPX. This type of... Read more
Views Last Activity
4,174 06-08-2009 04:05 AM by DanielGray Go to last post
 
Windows XP and Vista Threat: WORM_RBOT.AVL - Effects and Removal

The Worm_RBOT.AVL is dispersed through network shares. This category of worm gathers the listings of passwords and user names from the infected system. This type of threat comprises of a... Read more
Views Last Activity
4,711 06-11-2009 09:27 PM by DanielGray Go to last post
 
How to Avoid Neospace Internet Security Infections

This application is a false security scan usually offered for free on the internet. It pretends to detect malware form the user computer and later informs the user that it is incapable of... Read more
Views Last Activity
3,585 06-11-2009 09:59 PM by DanielGray Go to last post
 
VB EER Trojan info and removal

Downloader VB EER Trojan is a Win32 downloader and a dropper Trojan. This threat can get email addresses and forward the processes from files located in the local hard drives using the... Read more
Views Last Activity
4,024 06-16-2009 05:42 AM by DanielGray Go to last post
 
BBHK Spyware Trojan info and removal

The BBHK Trojan refers to a spyware and downloader that may contaminate Windows XP, and Vista Operating System. This kind of program is bundled with some freeware programs or installed through... Read more
Views Last Activity
3,720 06-16-2009 05:45 AM by DanielGray Go to last post
 
Remove the Google Hijack Virus!

The Google Hijack virus is a gateway program which infects a computer system with spyware. This virus is also a browser hijacker, wherein a the spyware overrides a user’s Internet browser,... Read more
Views Last Activity
19,373 06-17-2009 07:06 AM by KarlM Go to last post
 
How to remove SpyLocked

SpyLocked is a rogue anti-spyware, which is also known as Spywarelocked, is installed by Zlob Trojans. It camouflages its files as an audio or video codec and needs to be downloaded by the user... Read more
Views Last Activity
3,403 06-19-2009 01:06 AM by DanielGray Go to last post
 
How to avoid and remove Spyware.CyberLog-X

This type of threat is one of the recent scamware discovered in Mainland China. The Spyware.CyberLog-X has the possibility to contaminate executable files. According to some reports, it can... Read more
Views Last Activity
3,613 06-19-2009 01:09 AM by DanielGray Go to last post
 
Spyware Guard Malware Removal Instructions

The Spyware Guard is a famous fake sypware remover. It uses a Trojan to propagate the parasite into the system. The parasite may be downloaded by the user from various websites which might... Read more
Views Last Activity
4,178 06-19-2009 01:13 AM by DanielGray Go to last post
 
Ten Tips to Secure Your Computer

Years ago, hackers used to penetrate computer systems for the sheer thrill of it, as well as to show off their technical skills. Today, illegally breaking into systems can amount to a lot of money.
Views Last Activity
3,913 06-25-2009 04:17 AM by KarlM Go to last post
 
Effects and Removal of Back Orifice

A Back Orifice virus was created by CDC (Cult of the Dead Cow). It permits a remote system to manipulate the infected Windows computer using the GUI or console application. The remote user... Read more
Views Last Activity
4,625 06-30-2009 10:22 PM by DanielGray Go to last post
 
About Malware Bell and Removal Instructions

This particular application refers to fake anti-spyware software developed by malwarebell.com. The Malware Bell presents itself as a threat removal tool, but generally causes trouble to the affected... Read more
Views Last Activity
4,284 06-30-2009 11:25 PM by DanielGray Go to last post
 
How to Detect and Remove Email-Worm.Win32.Merond.a

One of the newest forms of malware doing the rounds is Email-Worm.Win32.Merond.a. This is an email worm that commonly comes as an attachment with infected emails. It also spreads itself... Read more
Views Last Activity
10,595 07-03-2009 08:19 AM by KarlM Go to last post
 
The Strom Worm

A backdoor threat that infect mostly private computers.
Views Last Activity
4,001 08-31-2009 10:34 PM by DanielGray Go to last post
 
Hyperjacking - Future Computer Server Threat

The Hyperjacking is one of the latest threats to computer servers. Since phishing and virus attacks now outdated, hackers are now trying to perform a new malicious execution,... Read more
Views Last Activity
11,849 09-02-2009 12:09 AM by DanielGray Go to last post
 
Autorun.ITA is also known as W32/Autorun.ITA

The Autorun.ITA is also known as W32/Autorun.ITA. This type of virus can severely damage a contaminated system. It propagates in stealth mode in order to shun away from users and... Read more
Views Last Activity
4,107 09-18-2009 04:53 AM by DanielGray Go to last post
 
How to check if files contain viruses before downloading from the Internet

How many times have downloaded files from the Internet? Probably often. For work, hobby, passion, etc. Wouldn't it be nice to know if the file you're downloading has a virus even before they... Read more
Views Last Activity
4,698 11-05-2009 01:53 AM by dwarkarao Go to last post
 
Ettercap, a powerful tool to avoid “Man In The Middle Attack”

Ettercap is a tool made by Alberto Ornaghi (ALoR) and Marco Valleri (NaGA) and provides a suite for man in the middle attacks on a LAN. It comes with both Command like Interface (CLI) and... Read more
Views Last Activity
9,176 04-26-2010 01:52 PM by metal333 Go to last post
 
How To Exclude Paths in McAfee Antivirus?

If you still face problems with your McAfee Antivirus, call PCCare247 for quick and complete resolution. Finding answer to all your computer problems is a child’s play for PCCare247 experts.
Views Last Activity
5,364 09-15-2012 12:19 AM by PCCare247 Go to last post
 
How to Verify the Security of File Downloads with FCIV (SHA1SUM)
Have you ever waited for a large file to download overnight, sometimes even pausing and resuming for days, only to find out in the end that the large

Each file on your computer can its own unique "fingerprint" and can be identified as unique even if it was saved along usb flashdrives, or sent via email, or even distributed via file... Read more
Views Last Activity
16,123 02-28-2014 07:30 AM by DominicD Go to last post
 

10 most read tutorials
Post New Tutorial

Display Options Moderators
Showing reviews 1 to 30 of 50 Moderators : 3
Sorted By Sort Order
From The

New posts New posts More than 20 replies or 1000 views Hot tutorial with new posts
No new posts No new posts More than 20 replies or 1000 views Hot tutorial with no new posts
Closed Tutorial Thread is closed  
 
Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is on
Smilies are on
[IMG] code is on
HTML code is Off


» Ads



1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54