• Main Menu
  • Malware

    • The History of Computer Viruses

      The History of Computer Viruses

      Computer viruses have been around just about as long as the personal computer has existed. With the advent of the Internet, the ability of viruses to rapidly spread has increased substantially. Despite this increase in capability to infect large numbers of computers across international borders, the definition of a computer virus has not substantially changed

    • lsass.exe

      lsass.exe

      LSASS, or local security authority subsystem service, is a process that functions as part of the Microsoft Windows operating system. Essentially, LSASS is part of the process for maintaining and enforcing the security protocols on the operating system. To this end, LSASS performs several important functions to ensure that the system remains free from unauthorized

    • How to Uninstall CyberDefender

      How to Uninstall CyberDefender

      CyberDefender is an example of malicious software that poses as an anti-virus software. CyberDefender runs a fake computer scan, then lists a number of “threats” that are really non-existent files, random files, or files that are essential to the computer’s performance. When the user attempts to remove these threats, CyberDefender asks the user to purchase

    • How to Remove Spyware Manually

      How to Remove Spyware Manually

      Manually removing spyware is not an easy task. Usually the best course of action to remove spyware from your computer is to download and install a free spyware removal tool that will do this job for you. However, sometimes a problem arises in which the spyware removal program is unable to delete the spyware files

    • The Zeus Virus

      The Zeus Virus

      The Zeus Virus is the popular term for the Zeus banking Trojan virus which was used to steal bank account details and passwords in the U.K. This resulted in a loss of more than $850,000 for those infected. The Zeus virus has been around for a number of years as part of the larger Zeus

    • Why People Write Computer Viruses?

      Why People Write Computer Viruses?

      We hear about new computer viruses all the time. What is the motivation behind developing computer viruses and watching them wreak havoc on the Internet? Fact Gathering Many viruses raid your documents including your email address book for information that can be used to make business contacts. This data is assembled into a database that

    • How to Delete WD SmartWare

      How to Delete WD SmartWare

      Western Digital (WD) Portable Hard Drives are capable of storing quite a bit of information. Modern Western Digital drives come with a firmware called “SmartWare,” which can be useful to some users. The SmartWare can provide backup solutions that may not be available with the operating system in use. WD hard drives with SmartWare also

    • g2mdlhlpx.exe

      g2mdlhlpx.exe

      The original g2mdlhlpx.exe is a part of Citrix GoToMeeting and GoToWebinar. Malware creators have copied this filename in an attempt to “hide” from PC owners and system administrators. Someone who has Citrix GoToMeeting or GoToWebinar installed does not have to worry about this process. However, if he/she does not have either of these Citrix products

    • How Do I Get Rid of About Blank?

      How Do I Get Rid of About Blank?

      About: Blank is a homepage hijacker that severely slows down your computer and shows popup advertisements randomly while using one’s Internet browser. While it does not do actual damage to the computer, it does limit what can be done on the computer because, at times, the About: Blank could be using as high as 80%

    • Why Do I Keep Getting Redirected from Google?

      Why Do I Keep Getting Redirected from Google?

      Google or any other search engine may become abnormal when a researcher attempts to search or click on a query and redirect him/her from the page that he/she intended to visit. This is known as a redirect and a wide variety of malware can cause it. It is important to understand what may be causing

    malware
    203 queries in 0.492 seconds.