• Main Menu
  • Malware

    • How to Uninstall Hotbar

      How to Uninstall Hotbar

      The HotBar add-on is an add-on program for Internet Explorer that personalizes email, as well as the  functionality and visual appearance of browser applications. While performing the functions noted above, HotBar also makes multiple connections with “hotbar.com” and “reports.shopperreports.com”. Hotbar also monitors phrases the user enters into search engines and reports them to third parties

    • How to Remove a Virus

      How to Remove a Virus

      A computer virus is designed to infect computer files through self-replication, and is able to infect other computers on its own. Viruses infect computers through boot sectors of portable drives, email attachments, other files, and by exploiting vulnerabilities in instant messaging and other real-time communication systems online. Not all computer viruses harm computers, but many

    • How to Remove the Generic.dx Trojan

      How to Remove the Generic.dx Trojan

      Generic.dx is a rather common trojan virus that infects the computer and weakens its security in order to allow other viruses and malicious software to infect the computer. It enters the computer via an email that the user opens, a website he/she visits, or a third party software that he/she downloads and installs. Generic.dx trojans

    • g2mdlhlpx.exe

      g2mdlhlpx.exe

      The original g2mdlhlpx.exe is a part of Citrix GoToMeeting and GoToWebinar. Malware creators have copied this filename in an attempt to “hide” from PC owners and system administrators. Someone who has Citrix GoToMeeting or GoToWebinar installed does not have to worry about this process. However, if he/she does not have either of these Citrix products

    • HijackThis

      HijackThis

      Are viruses and malware affecting your computer efficiency? Try HijackThis. HijackThis, popularly known in the computing world as HJT, is one of the most effective spyware and malware removal software tool available for detecting and removing harmful viruses, spyware, worms, Trojans and other pests affecting Microsoft Windows. This program was originally developed by Merijn Bellekom,

    • Computer Worms

      Computer Worms

      Computer worms are programs that reproduce, execute independently, and travel across network connections. The key difference between a virus and worm is the manner in which each reproduces and spreads. A virus is dependent upon the host file or boot sector and the transfer of files between computers to spread, whereas a computer worm can

    • How Do I Get Rid of About Blank?

      How Do I Get Rid of About Blank?

      About: Blank is a homepage hijacker that severely slows down your computer and shows popup advertisements randomly while using one’s Internet browser. While it does not do actual damage to the computer, it does limit what can be done on the computer because, at times, the About: Blank could be using as high as 80%

    • Why People Write Computer Viruses?

      Why People Write Computer Viruses?

      We hear about new computer viruses all the time. What is the motivation behind developing computer viruses and watching them wreak havoc on the Internet? Fact Gathering Many viruses raid your documents including your email address book for information that can be used to make business contacts. This data is assembled into a database that

    • Spyware

      Spyware

      “Spyware” is a term in computer security that is used to refer to a type of malicious program that is capable of infiltrating a user’s computer and spying on his/her activities. Spyware is often used to obtain identity-related or financial information, such as usernames, passwords, social security numbers, and other confidential information.  Spyware programs are

    • Trojan Virus

      Trojan Virus

      A Trojan virus is a piece of software designed to look like a useful file or software program but performs a possibly nefarious function once installed on a client computer. The virus takes its name from the “Trojan Horse” from Greek mythology setup outside of the city of Troy. Trojan horse viruses differ from other

    malware
    201 queries in 0.484 seconds.