SysChat is a free online computer support community. Ask questions, share resources, contribute knowledge and discuss technology. Join our growing community to access all features. Register Now!

SysChat » Tutorials » Security

Security

Guides and tutorials on computer security, antivirus, antispyware, malware, parental control, and privacy protection

Post New Tutorial
Tutorials in Category : Security Category Tools Search this Category
Sticky Thread Secure your computer from viruses and spyware for free
By Sajid

One of the hazards of using a computer online today is the danger of infestation with a variety of malware, viruses, trojan horses, spyware.
Views Last Activity
23,051 05-15-2007 08:47 PM by Unregistered Go to last post
 
Sticky Thread How to Detect and Remove Trojan.Win32.Agent.azsy

The Trojan.Win32.Agent.azsy program is one of the newer variants of the Trojan.Win32.Agent malware group. It penetrates systems through flaws in firewalls and small security vulnerabilities.... Read more
Views Last Activity
11,129 07-03-2009 08:21 AM by KarlM Go to last post
 
A Basic Guide To Internet Security
by John Rivers

The internet is a wonderful place; many of us use it on a regular basis for a multitude of functions.
Views Last Activity
4,255 02-20-2006 12:22 AM by Sami Go to last post
 
How Adware is bad for your PC... and how to get rid of it once and for all!

You download a nice P2P program and with it some software you don’t know. You don’t even bother researching it on the net. Then you work pleasantly on your PC, only to find something popping up... Read more
Views Last Activity
4,254 01-20-2009 01:18 AM by squirrelnmoose Go to last post
 
Vista Parental Control

Worried about the kids spending too much time on the internet and too little on homework? Microsoft Windows Vista has a solution to that. They have what they call time limits for each... Read more
Views Last Activity
4,231 06-05-2007 01:42 PM by hvios2007 Go to last post
 
Crusader Antivirus Manual Removal: Windows XP and Vista

Crusader Antivirus is a counterfeit program which presents itself as an antivirus application. It was developed by a company named RITAX Limited Software, and is identical to the AGAVA... Read more
Views Last Activity
4,205 05-29-2009 08:25 AM by KarlM Go to last post
 
Spyware Guard Malware Removal Instructions

The Spyware Guard is a famous fake sypware remover. It uses a Trojan to propagate the parasite into the system. The parasite may be downloaded by the user from various websites which might... Read more
Views Last Activity
4,177 06-19-2009 01:13 AM by DanielGray Go to last post
 
Hupigon ip139 removal instructions

The Hupigon ip139 Trojan refers to an application that permits a remote user to gain entrée to the target system. Its backdoor function is an executable file packed using UPX. This type of... Read more
Views Last Activity
4,169 06-08-2009 04:05 AM by DanielGray Go to last post
 
W32.Aspam.Trojan.B: Description, Effects, and Removal.

W32.Aspam.Trojan.B refers to a spyware and a BHO (Browser Helper Object) that can contaminate Windows 98, XP, and Vista. It disguises its files as Anti-Spyware software from Microsoft. ... Read more
Views Last Activity
4,141 06-06-2009 01:47 AM by DanielGray Go to last post
 
Autorun.ITA is also known as W32/Autorun.ITA

The Autorun.ITA is also known as W32/Autorun.ITA. This type of virus can severely damage a contaminated system. It propagates in stealth mode in order to shun away from users and... Read more
Views Last Activity
4,104 09-18-2009 04:53 AM by DanielGray Go to last post
 
VB EER Trojan info and removal

Downloader VB EER Trojan is a Win32 downloader and a dropper Trojan. This threat can get email addresses and forward the processes from files located in the local hard drives using the... Read more
Views Last Activity
4,023 06-16-2009 05:42 AM by DanielGray Go to last post
 
The Strom Worm

A backdoor threat that infect mostly private computers.
Views Last Activity
4,000 08-31-2009 10:34 PM by DanielGray Go to last post
 
Ten Tips to Secure Your Computer

Years ago, hackers used to penetrate computer systems for the sheer thrill of it, as well as to show off their technical skills. Today, illegally breaking into systems can amount to a lot of money.
Views Last Activity
3,912 06-25-2009 04:17 AM by KarlM Go to last post
 
BBHK Spyware Trojan info and removal

The BBHK Trojan refers to a spyware and downloader that may contaminate Windows XP, and Vista Operating System. This kind of program is bundled with some freeware programs or installed through... Read more
Views Last Activity
3,719 06-16-2009 05:45 AM by DanielGray Go to last post
 
Windows Vista: PatchGuard

The Vista kernel (64-bit) is supposedly impenetrable to modification. This is very significant as kernel-mode rootkits are becoming increasingly widespread. What is a Kernel Mode Rootkit? ... Read more
Views Last Activity
3,677 03-03-2009 04:03 AM by KarlM Go to last post
 
Good Security Habits
Mindi McDowell, Allen Householder

There are some simple habits you can adopt that, if performed consistently, may dramatically reduce the chances that the information on your computer will be lost or corrupted.
Views Last Activity
3,660 03-07-2006 11:41 PM by Sami Go to last post
 
How to avoid and remove Spyware.CyberLog-X

This type of threat is one of the recent scamware discovered in Mainland China. The Spyware.CyberLog-X has the possibility to contaminate executable files. According to some reports, it can... Read more
Views Last Activity
3,611 06-19-2009 01:09 AM by DanielGray Go to last post
 
Keep Your Passwords Safe on Public Use Computers
by G.L. Bailey

As you no doubt realize, passwords are the keys to our resources, our belongings and our online accounts, including our finances.
Views Last Activity
3,584 02-28-2006 12:34 AM by Sami Go to last post
 
How to Avoid Neospace Internet Security Infections

This application is a false security scan usually offered for free on the internet. It pretends to detect malware form the user computer and later informs the user that it is incapable of... Read more
Views Last Activity
3,583 06-11-2009 09:59 PM by DanielGray Go to last post
 
Debunking Some Common Computer Security Myths
By U.S. CERT Cyber Security Alert, Mindi McDowell

There are some common myths that may influence your online security practices. Knowing the truth will allow you to make better decisions about how to protect yourself.
Views Last Activity
3,511 02-24-2006 09:10 PM by Sami Go to last post
 
Insurrection 1.0 Malware: Windows XP

The Insurrection is categorized as a backdoor spyware, it records the log in of a user and searches for vital information. It catches the keystrokes in real time, the data it is able to fetch... Read more
Views Last Activity
3,501 06-03-2009 11:23 PM by DanielGray Go to last post
 
How to remove SpyLocked

SpyLocked is a rogue anti-spyware, which is also known as Spywarelocked, is installed by Zlob Trojans. It camouflages its files as an audio or video codec and needs to be downloaded by the user... Read more
Views Last Activity
3,401 06-19-2009 01:06 AM by DanielGray Go to last post
 

10 most read tutorials
Post New Tutorial

Display Options Moderators
Showing reviews 31 to 50 of 50 Moderators : 3
Sorted By Sort Order
From The

New posts New posts More than 20 replies or 1000 views Hot tutorial with new posts
No new posts No new posts More than 20 replies or 1000 views Hot tutorial with no new posts
Closed Tutorial Thread is closed  
 
Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is on
Smilies are on
[IMG] code is on
HTML code is Off


» Ads



1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54