싼야민공- Phomthong's LiveTV 3G+ Online

phomthong on livestream.com. Broadcast Live Free

Virus Computer Killer Chat

Tuesday 12 January 2010

Earn money with AlertPay $10 USD

Earn money with AlertPay $10 USD
Earn money with AlertPay! Each time you refer someone to AlertPay, you could earn up to $10 USD. The more people you bring to AlertPay, the more we will reward you.
Helping you earn more money -- think of this as our way of saying thank you.

Here are the ways you can integrate your referral link:

Referral
1.A unique referral hyperlink for your friends and customers. When users click on your link, they are prompted to sign up for an AlertPay account.
Example: Your referral URL is: https://www.alertpay.com/?8aNZ8mnBKy%2fihyzLDpXz6g%3d%3d


Link Code
2. A text link is an ad format that looks just like a standard hyperlink and will take on the font and color characteristics of your page.
Example: Send and receive money online with AlertPay

3.Banner Code
An ad format that looks like a banner image. When users click on your banner, they will be directed to your referral.
Start to make money online easily now!


Refer to our Alertpay site:

Sign up Now here
Start make $10 USD per 1 your own Referral!
Send and receive money online with AlertPay

Monday 11 January 2010

เขียนบล็อก Blog ทำเงินกับ Yuwie.com

เขียนบล็อก Blog ทำเงินกับ Yuwie.com

ร่วมกันสร้างรายได้มหาศาล โดยไม่ต้องเสียเงินลงทุน!!

ใครต้องการมีรายได้เสริมมากกว่า 100,000 บาทต่อเดือน

ใครต้ิองการโกยเงินดอลลาร์เข้าประเทศ

ใครต้องการมีเพื่อนมากมายทั้งชาวไทยและชาวต่างชาติ

YUWIE.COM คือทางเลือกที่ดีที่สุดของคุณ

ถ้าคุณรู้จัก Hi5 หรือ My space อย่ารอช้า!!
Yuwie ทำทุกอย่างได้เหมือนกับ Hi5 และ My space แต่เราได้เงิน!!

จ่ายจริง 1000% คนไทยได้รับมาแล้ว ดูหลักฐานคลิ๊ก!! http://ww3.yuwie.com/khantiko/

สมัครฟรี ไม่มีค่าใช้จ่ายใดๆ ไม่ต้องเข้าอบรม ไม่ต้องเดินทาง ไม่ต้องขายของ ไม่ต้องรอคลิกโฆษณา มีคู่มือสอนใช้งาน YUWIE ครบทุกอย่างฟรี!!


สิทธิพิเศษ!! สำหรับเพื่อนๆ ที่สมัครเป็นสมาชิกภายใต้ลิงค์ http://ww3.yuwie.com/yuwie.asp?r=641846 มีข้อเสนอสุดแจ่มมาก ๆ อยากรู้สมัครแล้วส่ง Message มาคุยกันนะ ^^


รายละเอียดเพิ่มเติมเกี่ยวกับ Yuwie คลิก >> http://ww3.yuwie.com/blog/?id=641846

จ่ายจริง 1000% คนไทยได้รับมาแล้ว ดูหลักฐานคลิ๊ก!! http://ww3.yuwie.com/khantiko/

สนใจสมัคร คลิกลิ้งค์ด้านล่างนี้ แล้วคลิก SIGN UP NOW
http://www.yuwie.com/phomthong
เลยจ๊า...
Refer to http://ww7.yuwie.com/blog/?id=641846&r=641846&linkid=69218

Sign at http://ww3.yuwie.com/
Sign Up and Start Make big Money online at http://www.yuwie.com/phomthong
สมัครและเริ่มทำเงินจากการสร้างบล็อกได้ทันที่ที่นี่
http://www.yuwie.com/phomthong

Sunday 10 January 2010

kill newest Virus Computer

kill newest Virus Computer
-ไวรัส Bi mat.exe
- Trojan horse Injector.HC by Super Antispyware ,CA YAHOO ANTI-SPY
- ไวรัส playboy.exe ไวรัส playboy.exe และ สร้างFolder ชื่อว่า play boy sex และอีก 3 folder คือ Khmer MP3 , Kong Fu Story,Phone Soft
- win32/pachita.a trojan by RRT Sergiwa Antiviral Toolkit
- win32/Almanกับwin32/Tanatos.M
- ไวรัส win32 psw.onlinegames.nmy trojan และ ou.cmd
- ไวรัส Bad Image
- ARK 12D.tmp WORM/Conficker.Y.13
ARK 12E.tmp WORM/Conficker.Z.55
- วิธีกำจัดไวรัส win32/delfInect.gen!BD
- ไวรัสTR/PSW.Kates.ra
- win32/flyagent.NDT trojan
- ไวรัส win32/conficker.AA worm
- ไวรัส Ex.HDD
- ไวรัส trojan.alemod
- วิธีการกำจัด virus NewHeur_PE
- Adaware.Trace.Cookie
- ไวรัส . คอมหอย 2010
- Trojan horse Packed.Protector.C
- kill ไวรัส auto.inf by cpe17antiautorun
-

Newest Virus Information

Newest Virus Information
McAfee


-PWS-Zbot.gen.ab
-Exploit-PDF.bc
-Exploit-PDF.bd
-Exploit-PDF.be
-Generic.dx!kud
-Generic PWS.y!brd

Tribute.A;B | Acid.A (intended) | WM/Theatre.A | WM/BADBOY.A;B;C | WM/CVCK1.B;E | WM/JAJA.A | W97M/Lami | W32/PetLil@MM | JS/Gigger.a@MM | W97M/Bablas.aj | W97M/Bablas.aj | W97M/Shore.p | VBS/Count | W97M/Alina.a@mm | WM/NOMVIR.A;B | W97M/Hope.p | W97M/Bibdot | W97M/Opey.C | VBS/Bhong | W97M/Seqnum | VBS/LoveLetter.bi | W97M/Change.A | X97M/Hopper.r | W97M/Jany.a | W97M/Alamat | W97M/Vale | W97M/Ekiam | VBS/Alphae | VBS/Zync | W97M/Kolop | VBS/Aqui | VBS/Ardin

W97M/Trugbar.a | VBS/Aqui | W97M/Alamat | W97M/Jany.a | VBS/Baracu.A@mm | W97M/Lami | Grass.A:De | Flip | WM/Helper.C;D;E | WM/Alliance.A

WM/HELPER.F;G;H | WM/Eraser.A:Tw | W97M/Lami | W97M/Alamat | VBS/Aqui | W32/MyWife.d@MM!M24

VBS/Aqui | W97M/Alamat | WM/Eraser.A:Tw | WM/Helper.C;D;E

WM/HELPER.F;G;H | WM/Eraser.A:Tw | AOS.A | W97M/Jackal.A | W32/Supova.d.worm | W32/Urick@MM | W32/Supova.e.worm | W32/Supova.f.worm | JS/Gigger.a@MM | W97M/Alamat | X97M/Hopper.r | VBS/Count | X97M/Anis | VBS/Aqui | VBS/Irvine@MM | VBS/Zync | VBS/Alphae | W32/Winur.worm.a | W32/Winur.worm.b

VBS/Aqui | W97M/Alamat | W32/Klez.e@MM | WM/Eraser.A:Tw | WM/KOMPU.A | WM/Helper.C;D;E

WM/Alliance.A | WM/Eraser.A:Tw | WM/ERASER.H | W32/Supova.f.worm | W32/Supova.e.worm | W32/Supova.d.worm | W97M/Alamat | VBS/Aqui

VBS/Aqui | W97M/Tolu | W97M/Alamat | W97M/Multi.a | VBS/San@M | WM/KOMPU.A | VBS/Valentin@MM | WM/Eraser.A:Tw

WM/Eraser.A:Tw | Acid.A (intended) | W97M/Jackal.A | TRASHER.D | W97M/Alamat | VBS/Alphae | VBS/Inself | VBS/Aqui

VBS/Aqui | VBS/IISDel.worm | VBS/Zync | WM/Helper.B | W97M/Alamat | X97M/Hopper.r | VBS/Baracu.A@mm | VBS/Count | VBS/Loveletter.ar | W97M/Melissa.ao@mm | X97M/Anis | AOS.A | WM/Helper.A;B | WM/Eraser.A:Tw | JS/Gigger.a@MM | W97M/Nono.A | W32/Urick@MM

WM/CVCK1.A | W97M/Bablas.aj | WM/Eraser.A:Tw | WM/Alliance.A | WM/MERCY.B | WM/JUNKFACE.A;B | W97M/Alamat | W32/Blurt@MM | VBS/Aqui

VBS/Aqui | W97M/Alamat | WM/Envader.A (Intended) | WM/Alliance.A | WM/Eraser.A:Tw | W97M/Yous

W97M/Yous | W97M/Rapmak.a | WM/CVCK1.B;E | WM/Goldsecret.B:Int | WM/FRIDAY.D | WM/FRIDAY.A | WM/Eraser.A:Tw | WM/Envader.A (Intended) | Twno.A | WM/BOOM.A;B | WM/BADBOY.A;B;C | W97M/Alamat | W97M/Digma | W97M/Idea.A | W97M/BackHand.A | WM/SHOWOFF.G | VBS/Aqui | VBS/Zync | VBS/Alphae

W97M/Ekiam | VBS/Aqui | W97M/Este | VBS/San@M | W97M/Alamat | WM/PHARDERA.C ;D (INTENDED) | WM/Eraser.A:Tw | W97M/Class.B | W97M/Class.D | W97M/Yous | VBS/Valentin@MM

W97M/Yous | W97M/Fifteen.a | JS/Gigger.a@MM | W32/PetLil@MM | WM/GANGSTERZ.A | W32/Urick@MM | Tribute.A;B | WM/Eraser.A:Tw | AOS.A | WM/Theatre.A | W97M/Jackal.A | W97M/Alamat | X97M/Hopper.r | W97M/Class.ed | VBS/Count | W97M/Courage.a | X97M/Anis | VBS/Aqui | VBS/Alphae | VBS/Zync | W32/Winur.worm.b | W32/Winur.worm.a

W97M/Akuma | W97M/Cash | XM/Laroux.IC | W97M/Alamat | WM/ERASER.H | WM/Concept.F;G;J | WM/Eraser.A:Tw | Tribute.A;B | W97M/Yous

W97M/Yous | W97M/Serpent | Acid.A (intended) | WM/Eraser.A:Tw | W97M/Jackal.A | W97M/Alamat | W32/Mypics.worm.25600 | VBS/Mantie.ow | W97M/Akuma

W97M/Akuma | W97M/Trugbar.a | W97M/Chameleon.a | W97M/Alamat | WM/Eraser.A:Tw | VBS/SWVK.ow.gen | W97M/Yous

Refer to http://home.mcafee.com/VirusInfo/VirusCalendar.aspx

Anti-Trojan horses

Anti-Trojan horses
Anti-Trojan Security News - News and information for protecting from trojans, viruses and other malicious software.
Anti-trojan.org - Includes detailed information on trojans, startup methods, and default backdoor ports.
Dark Eclipse Software - Trojan removal information, ICQ, and AIM security issues.
Megapanzer - An introduction to computer malware from an analyst's point of view. The blog offers code examples and explanations on how a Trojan horse intrudes a system and how it protects itself from being detected.
RegRun Security Suite - Registry monitor offering protection from trojans
Trojan-virus.com - Reviews of a number of trojan scanning and removal products.
Refer to http://www.dmoz.org/Computers/Security/Malicious_Software/Trojan_Horses/

Spyware and Adware

Spyware and Adware
Spyware Warrior - Blog of spyware news developments, testing results for anti-spyware products, details of rogue products and forums providing advice and support for people with spyware infections.

AntiSpy Web - Anti-spyware software downloads, prevention articles, and live threat alerts.
Anti-Spyware Coalition - A group dedicated to building a consensus about definitions and best practices in the debate surrounding spyware and other potentially unwanted technologies.
AntiVirusHelp - Provides step-by-step anti-spyware and firewall installation instructions intended for novice users.
AnySpyware - An article database that also includes human HijackThis log analysis.
The Art of Noh - A weblog on security, spyware, viruses and malware in general by Costin G. Raiu.
Ben Edelman - Doctoral student involved in spyware related research and investigations into associated unethical practices. Includes research papers, news, biography and presentations given.
CEXX Org - Counterexploitation - Detailed descriptions of various spyware, adware, and other parasitic software. Includes instructions for removing many common and not-so-common spyware and adware programs.
Check Processes - Online application that scans screenshots of the Windows Task Manager and analyzes listed processes for possible infections.
D. Dugan & Company - A collection of articles about spyware removal and protection tactics, all of which are written by users.
Destroy Adware - Provides definitions of common malware terms and tutorials on how to protect against malware.
Doxdesk - Information on how to prevent infection, lists of reputable and rogue products, database of known parasites and glossary of terms.
Free Internet Security.info - News, articles, guides, and information about how to keep computers secure from spyware and adware.
It Pays To Read License Agreements - Explains that if a person gets spyware and adware on his or her computer, it could be because he or she agreed to it.
MalekTips - Software-specific tips provided for several popular antispyware applications.
Malware Domain List - Featuring a list of malware-related sites plus a discussion forum on new threats.
Malware Help.org - News article database featuring articles submitted by users about malicious software threats.
Malwarebytes - Service offering removal tools and prevention advice.
MalwareInfo - Library of Windows memory processes that constitute spyware and adware threats. Provides information on process scanning for novice users.
Pctorium Computer Management - A website dedicated to helping users learn about computers and how to fix spyware, adware, viruses, trojans or any other issues you may have.
The Perfect Computer - Advice for novice users on which free anti-spyware software applications to install on their systems.
Process ID - List of common Windows processes with information on what they are and if they are a threat to a PC. Additionally includes a list of software used to remove spyware and viruses.
ProcessLibrary - Windows processes listed by name; a resource for determining whether a particular process is necessary, superfluous or even harmful.
Security Cadets - A resource with guides for novice users and news about the spyware field, with a discussion help forum.
Spy Watchman - Weblog and news site regarding developments and removal tips.
Spyware Adware Removal - A database of spyware-related articles and weblog entries.
Spyware Alert - An archive of spyware-related news articles.
Spyware Daily - Spyware news blog with news about the latest threats and news from the industry.
Spyware Removal - Information and resources regarding spyware and how to remove it. Get up-to-date information and removal instructions regarding the latest spyware and adware threats.
Spyware Security - A weblog with news articles pertaining to internet and spyware protection.
Spyware Sucks - News and analysis of emergent malware threats.
Spyware's Most Wanted - Instructions for beginners on how to install and use the most common paid and free anti-spyware products.
TeMerc Internet Countermeasures - Information on preventative measures, details of the malware community good guys and bad guys, and of specific spyware threats. Includes help forums.
Trend Labs Anti-Malware Blog - A blog published by Trend Micro reporting on recent malware outbreaks and discovered software exploits.
Vitalsecurity.org - A blog concerning spyware, malware, and mistakes that several of the big computer companies make.
What-is-exe Process Database - Directory of computer processes, including those associated with spyware applications.
Wikipedia - Spyware - A very detailed look at what spyware is, how it attaches itself to computers, and the common methods of prevention.

AIM: Getting More than You Bargained For - eSecurityPlanet columnist Ray Everett-Church says AOL's Instant Messenger software gives him more than he bargained for. (September, 2005)
SecurityFocus - Article about spyware keyloggers, how they work, how to remove them and prevention of keystroke capture. (April 14, 2005)
Refer to http://www.dmoz.org/Computers/Security/Malicious_Software/Spyware_and_Adware/

Computer Viruses

Computer Viruses
AskMen.com - How To: Keep Your Computer Virus-Free - Article with basic advice on virus prevention, and a primer on computer virus terminology.
Burton Systems Software - Virus Avoidance Advice - Advice for avoiding and recovering from computer virus infections, mostly for users of Microsoft Windows. Includes links to many free tools and other resources.
Computer Associates Virus Encyclopedia - Computer Associates alphabetical virus database. Searchable with clear descriptions of common viruses.
Computer Associates Virus Information Center - Virus information from makers of eTrust Antivirus (formerly known as InoculateIT).
Computer Virus Myths - The canonical reference for computer virus myths, hoaxes, and urban legends.
Computer Viruses In Unix Networks - Paper which examines in detail the problem of computer viruses as they relate to Unix and Unix-like systems.
comp.virus Newsgroup FAQs - FAQs from the comp.virus newsgroup
davebauer.net - Avoiding Viruses - Information to help computer users learn how to protect computers from viruses and hackers.
Doug Muth's Anti-Virus Help Page - Independent site with FAQs, papers, and other antivirus resources.
EICAR test file - Provides a standardized test file for signature based virus detection software. This file can be used to verify the correct operation of antivirus software without unnecessary exposure to viruses.
European Institute for Computer Anti-Virus Research (EICAR) - Combines universities, industry, media, technical, security, and legal experts from civil and military government and law enforcement as well as privacy protection organizations whose objectives are to unite non-commercial efforts against writing and proliferation of malicious code like computer viruses or Trojan Horses, and against computer crime and fraud.
Examples of Malicious Computer Programs - Long essay that describes harm done by major computer viruses or worms, and discusses the nonexistent or lenient punishment for the authors or distributors of these malicious programs.
Fire Antivirus Kit - Virus Information Library - Provides detailed information on viruses
F-Secure Virus Information Centre - A searchable database of virus descriptions, from the provider of F-Secure range of anti-virus software.
How Stuff Works: Computer Virus - Multipart tutorial describes how computer viruses work.
IBM's Antivirus Research - News and information about virus prevention, the latest in IBM's research, virus alerts, and lists of the latest hoaxes and hype.
McAfee Virus Information - Virus alerts, mailing list, and searchable descriptions of common viruses.
OpenAntiVirus Project - Project aimed at developing open source antivirus software comparable to current commercial offerings.
Panda Software Virus Laboratory - Up to date and in-depth descriptions of the most common viruses by Panda Software, makers of Panda Antivirus Platinum.
Personal Home page - Ferrie, Peter - Various research papers on computer viruses
Personal Home Page - Gordon, Sarah - Various papers on computer viruses, computer security, and ethics.
Personal Home Page - Harrold, Robert - Massive collection of antivirus links and news.
Personal Home Page - Szor, Peter - Research papers on computer viruses written by Peter Szor. The site covers Windows viruses and worms and the development of polymorphic and metamorphic viruses.
RAV Virus Encyclopedia - Virus Encyclopedia provided by RAV - Reliable AntiVirus.
Secunia - Virus Information - Collects virus information from multiple anti-virus vendors, and the collected information is grouped and indexed. When certain conditions are met virus alerts are generated and can be emailed.
Softpanorama University Skeptical Antivirus page - A skeptical look at anti-virus protection.
Solo Antivirus - Virus encyclopedia - Contains details about latest virus alerts and wide spread virus information.
Sophos Virus Analyses - This Sophos database holds the latest virus names and descriptions.
Symantec AntiVirus Research Center - Virus Encyclopedia site maintained by Symantec, makers of the popular Norton AntiVirus product.
Team Anti-Virus - An organization for independent anti-virus researchers to facilitate communication, collaboration, and public education. Publishes and links to many papers written by independent researchers.
Trend Virus Encyclopedia - Trend Micro issues regular advisories regarding new viruses, including a guide to avoiding them in the first place. Site covers risk factor of the newest viruses. lists top ten virus and offers a security alert archive.
Virus Bulletin - News and technical articles on developments on viruses and anti-virus products.
Virus or Hoax? - Created to provide basic information about viruses. Links to major anti-virus companies, public services, software downloads, and updates.
VirusList.com - Permanently replenishing information about new viruses. Mechanisms of breeding and operation, detailed analysis of algorithms of viruses. Methods to guard against computer viruses.
The WildList Organization International - Organization which maintains a list of computer viruses which are still found "in the wild".
Windows Startup Tasks - Massive listing of tasks that may be running on a Windows system at startup, including tasks which may be created by viruses, worms, spyware, and trojans

BusinessWeek Online - Mydoom's Most Damning Dynamic - Points out that Mydoom was so damaging only because so many individual net users were so unprotected despite education efforts that apparently do not have any significant effect on user behavior. (January 28, 2004)
Refer to http://www.dmoz.org/Computers/Security/Malicious_Software/Viruses/

Detection and Removal Tools

Detection and Removal Tools
ALWIL Software - avast! complete anti virus protection for all computers with a fast incremental update. Several versions available Home, Professional, Network, Enterprise, Groupware, and Firewall edition.
Antivirus Ware - Software retailer specializing in computer protection products.
Astonsoft - PC DoorGuard (intrusion scanner).
AV Eagle - Incident simulation program designed to help verify that antivirus and personal firewall programs are still operational and not disabled. Utilizes EICAR test files to verify signature based detection by installed virus scanner, and attempts to make outgoing connections to verify personal firewall operation.
AVDisk - Automates the process of creating antivirus boot disks from many popular virus scanners.
AVG Technologies - Offers anti-virus and internet security software. Site include product information, support facilities, and trial version downloads.
Avira - Produces AntiVir for multiple platforms, as well as a firewall, anti-malware and recovery solutions
BitDefender - Offers a variety of antivirus products, including specialized handheld device, peer-to-peer, and email scanners
BullGuard - Software featuring combined firewall, anti-virus, spam, and backup programs.
Central Command, Inc. - Company markets Vexira Antivirus software as well as: virus protection consulting, implementation, and audit services. Free trial virus protection downloads and up-to-date virus information.
Clam AntiVirus - Toolkit for UNIX systems released under GPL. Provides a scanning daemon intended primarily for mailserver integration, command line scanner for on-demand scanning, and update tool.
ClamWin - Free Windows antivirus software, licensed under GPL with open source code. Project information, screenshots, download, news, and user guide.
ClamXav - A free graphical virus checker for Mac OS X that uses the ClamAV antivirus engine as a back end. Includes documentation and a support forum.
Command AntiVirus - Anti virus products, downloads, support, and information on viruses.
Declude Virus - Mail server virus and vulnerability control software.
Deerfield - Visnetic Antivirus, AntiVirus Plug-in for MDaemon and AntiVirus Plug-in for EmailGuardian.
ESET - Provides antivirus software for home and business users, with firewall and antispam options also available.
Finjan Software, Inc. - Offers software designed to combat server threats and manage servers as well.
FRISK Software International - F-Prot Antivirus for 32-bit Windows, Linux and other platforms.
F-Secure - Anti-virus and anti-intrusion software designed for both home and corporate users.
GFI MailSecurity - An e-mail content-checking, anti-virus and e-mail exploit-detection solution for Exchange and SMTP servers.
Hauri, Inc - Offer virus detection software (ViRobot) for servers (Windows/Unix), mail gateways (Domino/Exchange) and desktop (Windows) environments.
Kaspersky Lab - Developer of anti-virus, anti-spyware, anti-spam and personal firewall products. Includes downloadable trial versions.
Mail Warden - Mailserver content/virus filtering which integrates with Exchange, Lotus Notes, SLMail, and other mailservers.
McAfee.com - Produces the McAfee VirusScan line of antivirus software, as well as various specialized products for home and business users. Also offers managed security services for home and business users.
MDaemon AntiVirus - Email scanning application for MDaemon, designed around the Kaspersky engine.
MicroWorld Technologies, Inc. - eScan and MailScan provides protection for the home PC, mail servers or entire network. Product specifications, screenshots, support forums, FAQs, news letter and download.
MoonSecure - Free antivirus for Windows under GPL license. Includes scan engines, firewall, rootkit prevention.
My-eTrust.com - Provides security and anti-virus software for small businesses and home computing.
netMailshar - Mailserver with integrated virus scanning
Nitrous Anti Spy - Anti virus, software for protection against virus, Trojan, and hacker attacks against your computer. Includes firewall and port scan protection.
Norman ASA - Anti-virus software, personal firewall, risk analysis, encryption, data recovery and certified data erasure.
PCLogger - Utility designed to detect changes that suspected malicious software are making.
Prognet Technologies - Fire anti-virus kit (detection and repair).
Quick Heal - India's leading anti-virus software. Available for Windows 95/98/ME/NT/2000/XP and can detect and remove all types of viruses. Prevents virus, trojan, and worm infections from internet downloads, email attachments, and network infections.
RAV Antivirus - Antivirus software package with plugins for many popular IM programs.
SmartCOP Anti-Virus - An easy to use yet powerful anti-virus software. Insta Scan utility allows users to scan their system online.
Solo Antivirus - Provides virus detection and removal tools, virus alerts, security information.
Sophos Anti-Virus - Antivirus software package targeted at business customers
Sybari Software, Inc. - Antigen for Lotus Domino and Antigen for Microsoft Exchange Servers.
Symantec - Makers of popular Norton Antivirus product.
Trend Micro Antivirus - News, product information from the anti-virus software developer.
Unistal Systems Pvt. Ltd. - Unistal Anti-Virus Software (virus detection and repair).
Update Sophos - Utility to automate the download of virus definition updates (IDE files) for Sophos Anti-Virus for Windows.
VET - VET Anti-virus. A eTrust company.
VirusArrest - Monitors Microsoft Outlook for evidence of viruses and worms. Warns of attempts by other programs to attach files to messages.
WebImmune - WebImmune allows users to submit infected files for analysis and offers detailed advice on removing the viruses it finds.
Refer to http://www.dmoz.org/Computers/Security/Malicious_Software/Viruses/Detection_and_Removal_Tools/

Antivirus software

Antivirus software
Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware.

A variety of strategies are typically employed. Signature-based detection involves searching for known malicious patterns in executable code. However, it is possible for a user to be infected with new malware in which no signature exists yet. To counter such so-called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses by looking for known malicious code (or slight variations of such code) in files. Some antivirus software can also predict what a file will do if opened/run by emulating it in a sandbox and analyzing what it does to see if it performs any malicious actions. If it does, this could mean the file is malicious.

However, no matter how useful antivirus software is, it can sometimes have drawbacks. Antivirus software can degrade computer performance if it is not designed efficiently. Inexperienced users may have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection (of any kind), success depends on achieving the right balance between false positives and false negatives. False positives can be as destructive as false negatives. In one case, a faulty virus signature issued by Symantec mistakenly removed essential operating system files, leaving thousands of PCs unable to boot.[1] Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack.[2]

In addition to the drawbacks mentioned above, the effectiveness of antivirus software has also been researched and debated. One study found that the detection success of major antivirus software dropped over a one-year period.
Refer to http://en.wikipedia.org/wiki/Antivirus_software

Multipartite virus

Multipartite virus
A multipartite virus is a computer virus that infects and spreads in multiple ways. The term was coined to describe the first viruses that included DOS executable files and PC BIOS boot sector virus code, where both parts are viral themselves. For a complete cleanup, all parts of the virus must be removed. The term was coined, as prior to the discovery of the first of these, viruses were categorized as either file infectors or boot infectors. Because of the multiple vectors for the spread of infection, these viruses could spread faster than a boot or file infector alone.

Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Refer to http://en.wikipedia.org/wiki/Multipartite_virus

Spam (electronic)

Spam (electronic)
Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, and file sharing network spam.

Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming is widely reviled, and has been the subject of legislation in many jurisdictions.[1]

People who create electronic spam are called spammers.[2]

Refer to http://en.wikipedia.org/wiki/Spam_(electronic)

computer virus hoax

computer virus hoax
A computer virus hoax is a message warning the recipient of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipient to forward it to everyone they know.

Most hoaxes are sensational in nature and easily identified by the fact that they indicate that the virus will do nearly impossible things, like blow up the recipient's computer and set it on fire, or less sensationally, delete everything on the user's computer. They often include announcements claimed to be from reputable organizations such as Microsoft, IBM, or news sources such as CNN and include emotive language and encouragement to forward the message. These sources are quoted in order to add credibility to the hoax.

Virus hoaxes are usually harmless and accomplish nothing more than annoying people who identify it as a hoax and waste the time of people who forward the message. Nevertheless, a number of hoaxes have warned users that vital system files are viruses and encourage the user to delete the file, possibly damaging the system. Examples of this type include the jdbgmgr.exe virus hoax and the SULFNBK.EXE hoax.[1][2]

Some consider virus hoaxes and other chain e-mails to be a computer worm in and of themselves. They replicate by exploiting users' ignorance or emotional responses.

Hoaxes are not to be confused with computer pranks. Computer pranks are programs that perform unwanted and annoying actions on a computer, such as randomly moving the mouse.

Refer to http://en.wikipedia.org/wiki/Virus_hoax

Trojan horse virus Computer

Trojan horse virus Computer
A Trojan horse (sometimes shortened to trojan[n 1]), is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. The term is derived from the Trojan Horse story in Greek mythology.

Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.

Operations that could be performed by a hacker on a target computer system include:

Use of the machine as part of a botnet (i.e. to perform spamming or to perform Distributed Denial-of-service (DDoS) attacks)
Data theft (e.g. passwords, credit card information, etc.)
Installation of software (including other malware)
Downloading or uploading of files
Modification or deletion of files
Keystroke logging
Viewing the user's screen
Wasting computer storage space
Trojan horses require interaction with a hacker to fulfill their purpose, though the hacker need not be the individual responsible for distributing the Trojan horse. In fact, it is possible for hackers to scan computers on a network using a port scanner in the hope of finding one with a Trojan horse installed, that the hacker can then use to control the target computer.[1]

A trojan differs from a virus in that only a file specifically designed to carry it can do so.

Refer to http://en.wikipedia.org/wiki/Trojan_horse_(computing)

mobile virus

mobile virus
A mobile virus is an electronic virus that targets mobile phones or wireless-enabled PDAs

As wireless phone and PDA networks become more numerous and more complex, it has become more difficult to secure them against electronic attacks in the form of viruses or other malicious software (also known as malware).

The first instance of a mobile virus occurred in June 2004 when it was discovered that a company called Ojam had engineered an anti-piracy Trojan virus in older versions of their mobile phone game Mosquito. This virus sent SMS text messages to the company without the user's knowledge. This virus was removed from more recent versions of the game; however it still exists on older, unlicensed versions. These older versions may still be distributed on file-sharing networks and free software download web sites.

In July 2004, computer hobbyists released a proof-of-concept mobile virus named Cabir. This virus replicates itself on Bluetooth wireless networks.[1]

In March 2005 it was reported that a computer worm called Commwarrior-A has been infecting Symbian series 60 mobile phones. This worm replicates itself through the phone's Multimedia Messaging System (MMS). It sends copies of itself to other phone owners listed in the phone user's address book. Although the worm is not considered harmful, experts agree that it heralds a new age of electronic attacks on mobile phones.

Common mobile viruses

Cabir: Infects mobile phones running on Symbian OS. When a phone is infected, the message 'Caribe' is displayed on the phone's display and is displayed every time the phone is turned on. The worm then attempts to spread to other phones in the area using wireless Bluetooth signals.

Duts: A parasitic file infector virus and is the first known virus for the PocketPC platform. It attempts to infect all EXE files in the current directory (infects files that are bigger than 4096 bytes)

Skulls: A trojan horse piece of code. Once downloaded, the virus, called Skulls, replaces all phone desktop icons with images of a skull. It also will render all phone applications, including SMSes and MMSes useless

Commwarrior: First worm to use MMS messages in order to spread to other devices. Can spread through Bluetooth as well. It infects devices running under OS Symbian Series 60. The executable worm file once launched hunts for accessible Bluetooth devices and sends the infected files under a random name to various devices.
Refer to http://en.wikipedia.org/wiki/Mobile_virus

Spyware

Spyware
Spyware is a type of malware that is installed on computers and collects information about users without their knowledge. The presence of spyware is typically hidden from the user. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.

While the term spyware suggests software that secretly monitors the user's computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.

In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer. The US Federal Trade Commission has placed on the Internet a page of advice to consumers about how to lower the risk of spyware infection, including a list of "do's" and "don'ts."
Refer to http://en.wikipedia.org/wiki/Spyware
Malware
Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.[1] The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.

Software is considered malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. In law, malware is sometimes known as a computer contaminant, for instance in the legal codes of several U. S. states, including California and West Virginia.[2][3]

Malware is not the same as defective software, that is, software that has a legitimate purpose but contains harmful bugs.

Preliminary results from Symantec published in 2008 suggested that "the release rate of malicious code and other unwanted programs may be exceeding that of legitimate software applications."[4] According to F-Secure, "As much malware [was] produced in 2007 as in the previous 20 years altogether."[5] Malware's most common pathway from criminals to users is through the Internet: primarily by e-mail and the World Wide Web.[6]

The prevalence of malware as a vehicle for organized Internet crime, along with the general inability of traditional anti-malware protection platforms to protect against the continuous stream of unique and newly produced professional malware, has seen the adoption of a new mindset for businesses operating on the Internet - the acknowledgment that some sizable percentage of Internet customers will always be infected for some reason or other, and that they need to continue doing business with infected customers. The result is a greater emphasis on back-office systems designed to spot fraudulent activities associated with advanced malware operating on customers' computers.[7]

viruses and worms
Trojan horses, rootkits, and backdoors
spyware, botnets, keystroke loggers, and dialers
http://en.wikipedia.org/wiki/Malware

Crimeware

Crimeware
Crimeware is a class of malware designed specifically to automate cybercrime.[1] The term was coined by Peter Cassidy, Secretary General of the Anti-Phishing Working Group to distinguish it from other kinds of malevolent programs.[citation needed]

Crimeware (as distinct from spyware, adware, and malware) is designed (through social engineering or technical stealth) to perpetrate identity theft in order to access a computer user's online accounts at financial services companies and online retailers for the purpose of taking funds from those accounts or completing unauthorized transactions that enrich the thief controlling the crimeware. Crimeware also often has the intent to export confidential or sensitive information from a network for financial exploitation. Crimeware represents a growing problem in network security as many malicious code threats seek to pilfer confidential information.
Refer to http://en.wikipedia.org/wiki/Crimeware

computer worm virus

computer worm virus
A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Protecting against dangerous computer worms
Worms spread by exploiting vulnerabilities in operating systems. All vendors supply regular security updates[6] (see "Patch Tuesday"), and if these are installed to a machine then the majority of worms are unable to spread to it. If a vendor acknowledges a vulnerability, but has yet to release a security update to patch it, a zero day exploit is possible. However, these are relatively rare.

Users need to be wary of opening unexpected email,[7] and should not run attached files or programs, or visit web sites that are linked to such emails. However, as with the ILOVEYOU worm, and with the increased growth and efficiency of phishing attacks, it remains possible to trick the end-user into running a malicious code.

Anti-virus and anti-spyware software are helpful, but must be kept up-to-date with new pattern files at least every few days. The use of a firewall is also recommended.

In the April-June, 2008, issue of IEEE Transactions on Dependable and Secure Computing, computer scientists describe a potential new way to combat internet worms. The researchers discovered how to contain the kind of worm that scans the Internet randomly, looking for vulnerable hosts to infect. They found that the key is for software to monitor the number of scans that machines on a network sends out. When a machine starts sending out too many scans, it is a sign that it has been infected, allowing administrators to take it off line and check it for viruses
Refer to http://en.wikipedia.org/wiki/Computer_worm

Adware

Adware
Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software.

Advertising functions are integrated into or bundled with the software, which is often designed to note what Internet sites the user visits and to present advertising pertinent to the types of goods or services featured there. Adware is usually seen by the developer as a way to recover development costs, and in some cases it may allow the software to be provided to the user free of charge or at a reduced price. The income derived from presenting advertisements to the user may allow or motivate the developer to continue to develop, maintain and upgrade the software product. Conversely, the advertisements may be seen by the user as interruptions or annoyances, or as distractions from the task at hand.

Some adware is also shareware, and so the word may be used as term of distinction to differentiate between types of shareware software. What differentiates adware from other shareware is that it is primarily advertising-supported. Users may also be given the option to pay for a "registered" or "licensed" copy to do away with the advertisements.

Adware can also download and install Spyware.

Well-known adware programs/programs distributed with adware
123 Messenger
180SearchAssistant
888bar
Adssite Toolbar
AOL Instant Messenger
Ask.com Toolbar (Toolbar is automatically installed with many different programs, even after you uncheck Ask.com during the installation process.)
Bearshare
Bonzi Buddy
BlockChecker
Burn4Free
ClipGenie
Comet Cursor
Crazy Girls
Cydoor
Daemon Tools - (Software comes bundled with the "Daemon Tools WhenUSave Toolbar" but can be unchecked during installation)
DivX
DollarRevenue
eBike Insurance
eCar Insurance
eVan Insurance
Ebates MoneyMaker
ErrorSafe
ErrorSweeper
Evernote
Ezula
FaceGame.exe
FormatFactory
Foxit PDF Reader
FlashGet
Gamevance
Gator
Gool.exe
IWNet
Kazaa
Kiwee Toolbar
Messenger Plus! Live - (Software comes bundled with adware, but can be unchecked during installation)
MessengerSkinner
Mirar Toolbar
Oemji Toolbar
PornDigger!
Smiley Central
Spotify - (A subscription can be paid to remove ads.)
TagASaurus
TopMoxie
Tribal Fusion
Videothang
Viewpoint Media Player
VirusProtectPro
Vuze
WeatherBug
WhenU
WinAce (now with MeMedia AdVantage)
Windows Live Messenger
Winzix
XXX Shop online
XXX Toy
Yahoo! Messenger
Zango
Zango Toolbar
Zwinky
The Eudora e-mail client is a popular example of an adware "mode" in a program. After a trial period during which all program features are available, the user is offered a choice: a free (but feature-limited), an ad-supported mode with all the features enabled, or a paid mode that enables all features and turns off the ads.
Refer to http://en.wikipedia.org/wiki/Adware

Virus Computer

Virus Computer
A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[1][2]

The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or go unnoticed.
Refer to http://en.wikipedia.org/wiki/Computer_virus

Welcome to Virus Computer Killers Club

Welcome to Virus Computer Killers Club
Update the newest virus computer to remove, kill new virus computer here.

Malware Fix New Update

Latest Virus Descriptions

Latest Virus News

BitDefender - Latest Threats

Sophos latest virus and spyware detection

ESET Threat Center

Trend Micro - Malware Top10

Avira - Latest Threats Descriptions

CA Security Advisor Virus Alerts

AVG | Virus Database Updates

AVG | Virus Database Updates

Free Download Antivirus & Safety Software

US-CERT Current Activity

Clam AntiVirus

NORMAN:Virus warnings

ข่าวไอทีและโปรแกรมสแกนไวรัส

Top Ten Security Privacy Reviews