Computer Support Unlimited Annual Plan of £109.99
Call now at 0 800 635 9644

Monday, October 25, 2010

How to Get Rid of AV Security Suite From Your Computer?

While the name AV security suite may sound like it would be something good for your computer, this software is just the opposite. It uses fear and relies on you not having much knowledge of how these things work in order to frighten you enough that you are willing to purchase this so fake anti-virus program.

AV Security Suite generally gets on your computer in several different ways including through hacked sites you visit, via spam emails and gets installed without your knowledge or permission. From there it will automatically change files on your computer so that it will have permission to run automatically every time your computer boots up and will run silently in the background.

It can start using it's scare tactics by popping up on your screen at unexpected times displaying messages that your computer is currently infected by viruses, malware or spyware. Sometimes it will even tell you that your computer is under attack by an external source. Other times it will display a screen saying that your computer has been scanned and it is currently having certain problems. All of this is done to make it look as if you need to purchase their program in order to resolve these security issues with your PC and you need to get rid of AV security suite from your computer.

What you need to realize is that even legitimate sites can become a host for the AV Security Suite. This usually happens when a site is hacked and the virus is put into place on the page somewhere. This is also how people can become infected multiple times over the course of a few days because of going to the same site over and over again to read new things. This is especially true for computers that have not been kept up to date with anti-malware protection.

In order to make this ruse even more believable that your computer is infected, AV security suite will prevent random programs from working as they should. It will also automatically connect your computer to an external site. This will allow it to display fake security messages as you surf the web giving you fake warnings about how these pages are reported as being unsafe.

If you want to get rid of AV security suite it can be quite a hassle if done manually.

#1 First, you will need to go into your computer Internet Explorer options and go to Connections --> LAN Settings --> and uncheck the box saying "Use a proxy server for your LAN". Once that is done you can move on to file removal.

#2 File removal is going to be quite a task. Usually every program has a list of names and files associated to it that you can remove. Because of the random way the virus installs the files it is almost impossible to find them. The registry entries on the other hand are slightly easier to locate and get rid of. They include anything with avsuite or AV security suite in the name and you will have to search for them in the registry and delete them.

Once all of that has been removed you should no longer have any problems. But if you still have problems or there is further malware on your computer you can download and run PC health check software that will help you get rid of AV security suite fast. It will scan your computer and delete any malicious software for you and make your PC run fast and get rid of any malware in minutes.

source: ezinearticles


Wednesday, October 13, 2010

How to Get Rid of Security Center 2010 From Your Computer Quickly and Protect it From Malware?

Desktop Security 2010 sounds like an awfully good idea to have something like that on your computer these days more than ever because of the growing threat of malicious programs we can easily come into contact with online. But what happens when a program that looks and acts like a security software is actually what is causing the problems you are having with your computer? This is the reason you need to get rid of desktop security 2010 from your PC.

What if the only reason that program was even created to cause you so many computer issues that you feel the only option you have left is to activate your copy of desktop security 2010 in the hopes that it cleans up all the security threats it finds on your PC?

The first thing that this malware does after it is installed and your computer is brought up is that it will scan your system and provide you with many different types of security threats in the form of spyware, malware and viruses. Now, for the most part if you have received a screen like this, while it may look very serious in reality all of those infections are actually nothing more than either files you need on your computer for it to run properly or even files created when desktop security 2010 was installed to make things look very bad for your PC.

Now I am sure you are familiar with pop up messages. They are one of the things that PC users dislike the most about being online. They can be just mildly annoying all the way up to outright offensive depending on how many there are. Well, once that first scan is done on your system with the desktop security 2010, you can expect a steady stream of pop up error messages that all tell you in many different ways that your computer is currently not secure and there are several threats active on your PC. in reality you need to get rid of desktop security 2010 from your PC.

By this point you are likely to take it to a professional and have them restore the functionality to your PC, before Desktop Security 2010 sounds like an awfully good idea to have something like that on your computer these days more than ever because of the growing threat of malicious programs we can easily come into contact with online. But what happens when a program that looks and acts like a security software is actually what is causing the problems you are having with your computer? This is the reason you need to get rid of desktop security 2010 from your PC.

What if the only reason that program was even created to cause you so many computer issues that you feel the only option you have left is to activate your copy of desktop security 2010 in the hopes that it cleans up all the security threats it finds on your PC?

The first thing that this malware does after it is installed and your computer is brought up is that it will scan your system and provide you with many different types of security threats in the form of spyware, malware and viruses. Now, for the most part if you have received a screen like this, while it may look very serious in reality all of those infections are actually nothing more than either files you need on your computer for it to run properly or even files created when desktop security 2010 was installed to make things look very bad for your PC.

Now I am sure you are familiar with pop up messages. They are one of the things that PC users dislike the most about being online. They can be just mildly annoying all the way up to outright offensive depending on how many there are. Well, once that first scan is done on your system with the desktop security 2010, you can expect a steady stream of pop up error messages that all tell you in many different ways that your computer is currently not secure and there are several threats active on your PC. in reality you need to get rid of desktop security 2010 from your PC.

By this point you are likely to take it to a professional and have them restore the functionality to your PC, before desktop security 2010 begins causing more problems. The good news is that you can do the same thing they would, only for cheaper and from the comfort of your own home. All it takes is to download and run a system and registry scanner to protect your pc and the information stored on it. Not to mention all it will take is just a few moments of your time. Once you do this all you need to do is to run a scan on your computer and this will get rid of desktop security 2010 and other malware and computer errors quickly. Scan your computer now and keep it safe.

Monday, September 27, 2010

How to Keep Your Wireless Internet Browsing Private from Other Neighboring Wireless Sources

Wireless networks are used in homes with laptops or with computers that are not physically close enough together to have hardwired connections. When you set up a wireless network, the service set identifier (SSID) is broadcast, so other users can view the available networks in the area. You can make the network private by applying a passkey on the wireless router, which blocks unauthorized users. The passkey is required before others can connect, including neighbors or other people in the area of your home.

Two common home routers include Linksys and Netgear, and both these manufacturers provide password protection.

Linksys Router

  • Open your Web browser and enter the IP address for your router in the navigation text box. The default address for a new Linksys is 192.168.1.1. Enter your admin user name and password. New routers have a blank username, and the password is "admin."
  • Click the "Wireless" link to open a window with your current settings. Select "WPA Personal" from the security drop-down box. This enables a new text box where you enter your passkey.
  • Enter a new passkey in the text box and click the "Save" button. Close the Web browser. The wireless network is now password-protected from unauthorized access.
Netgear
  • Open a Web browser and enter the IP address for your router. The default IP address for new Netgear routers is also 192.168.1.1. Enter the router's username and password. The default admin user name is "admin" and the password value is "password."
  • Click the "Wireless" link on the left side of the console window. This displays the current settings for your Netgear router.
  • Select "WPA Personal" in the "Security Options" drop-down box. In the text box enabled, enter your passkey for the router. Click the "Apply" button to save the settings.

Source: ehow.com
For More Details: Wireless network Setup

Tuesday, September 14, 2010

How to Make Your Computer Live Longer?

Here are a few useful little tips that might extend the life your computer. Don"t worry, you probably already know them, but reminders never hurt anyone:

  • Shut it Down: This may sound simple but many of us just close the lid, turn of the monitor or set it to sleep mode. Completely shutting your computer down will keep it from overheating and leaking memory. Think of your computer like your brain, it can"t function without a good night"s sleep.
  • Defrag: Again, another simple "duh" moment. Defrag your computer. Most PCs will even let you set up a regular defrag schedule once a week. Cleaning up your files on a regular basis will also keep your computer functioning at optimal speed.
  • Keep it Clean: During your regularly scheduled defrag, go ahead and run a scan for viruses, spyware, malware, all that bad stuff you can pick on the internet. Find a good program to keep your PC"s health good.
  • Don"t Drop It: Look, be nice to your laptops. Keep them in safe places, don"t expose them to weird temperatures and be sure not to eat or drink near them if possible. Also pets. I lost a laptop a few years ago to a cat pouncing on and then hairballing all over my keys, it broke my screen and something gross seeped into the circuitry. Trust me, helping your computer and your pets avoid each other is a good idea.

These might not be the most enlightening tips, but they"ll go along way in keeping your computer chugging along for an extra year or so.

Source: technology-blog

For More Details:

Computer Security Services

Tuesday, July 13, 2010

Home Computer Security

Thinking About Securing Your Home Compute:-

Before diving into the tasks you need to do to secure your home computer, let’s first think about the problem by relating it to something you already know how to do. In this way, you can apply your experience to this new area.

So, think of your computer as you would your house, your apartment, or your condo. What do you know about how that living space works, what do you routinely do to keep it secure, and what have you installed to improve its security? (We’ll use this “computer-is-like-a-house-and-the-things-in-it” analogy throughout, departing only a few times to make a point.)

For example, you know that if you have a loud conversation, folks outside your space can probably hear you. You also routinely lock the doors and close the windows when you leave, and you don’t give the keys to just anyone. Some of you may install a security system to complement your practices. All of these are part of living in your home.

Let’s now apply similar thinking to your home computer. Email, instant messaging, and most web traffic go across the Internet in the clear; that is, anyone who can capture that information can read it. These are things you ought to know. You should always select and use strong passwords and exercise due care when reading all email, especially the unsolicited variety. These are things you ought to do. Finally, you can add a firewall, an anti-virus program, patches, and file encryption to improve the level of security on your home computer, and we’ll call these things you ought to install.

The rest of this document describes the things you ought to know, do, and install to improve the security of your home computer.

What Should I Do To Secure My Home Computer?

Task 1 - Install and Use Anti-Virus Programs

Task 2 - Keep Your System Patched

Task 3 - Use Care When Reading Email with Attachments

Task 4 - Install and Use a Firewall Program

Task 5 - Make Backups of Important Files and Folders

Task 6 - Use Strong Passwords

Task 7 - Use Care When Downloading and Installing Programs

Task 8 - Install and Use a Hardware Firewall

Task 9 - Install and Use a File Encryption Program and Access Controls

Tuesday, June 15, 2010

How To Restoring A Hijacked Browser ?

Browser hijacking is a online attack in which hackers take control on your computer browser and change how and what it display when you are working on the web. this post provide Browser support, If you browser already hijack, how to restore the hijacked browser.

The following six tips can help restore your browser's settings:

1. Stop cascading pop-up windows.
If a seemingly endless number of pop-up windows appear on your screen, you'll probably want to stop the deluge first. To do this in Microsoft Windows Vista, Windows XP, or Windows 2000 while using Internet Explorer:
1. Press CTRL+ALT+DEL, click Task Manager, and then click the Processes tab.
2. Click IEXPLORE.EXE, and then click the End Process button.

This closes all instances of Internet Explorer. Then you can re-open the program to continue browsing as usual. To help prevent future attacks, you should also have a pop-up blocker turned on. To turn on the pop-up blocker in Internet Explorer 7:

1. Click Tools menu, click Internet Options, and then click the Privacy tab.
2. In the Pop-up Blocker box, select the Block pop-ups check box. Click OK.

If you still experience the other effects of a hijacked Web browser, try the following:

2. Install preventive software such as the kinds mentioned in the preceding Preventing browser hijacks section. Many browser hijacking programs can be identified and removed by downloading, installing, and running these programs.

3. Run the malicious software removal tool. This can catch some, but not all, kinds of hijacking software.

4. Reset Internet Explorer settings. If you're using Internet Explorer and your home page has been changed, you can often reset it yourself.

• Close any Internet Explorer or Windows Explorer windows that are currently open.
• Open Internet Explorer.
• Click Tools, and then click Internet Options.
• Click the Advanced tab, and then click Reset.
• In the Reset Internet Explorer Settings dialog box, click Reset.
• When Internet Explorer finishes restoring the settings, click Close, and then click OK.
• Close Internet Explorer.
Your changes will take effect the next time you open Internet Explorer.

5. Disable add-ons. Many browser hijackings come from add-ons, also known as ActiveX controls, browser extensions, browser helper objects, or toolbars. These items can improve your experience on a Web site by providing multimedia or interactive content, such as animations. However, some add-ons can cause your computer to stop responding or display content that you don't want, such as pop-up ads.

To learn how to disable add-ons in Windows Vista or Windows XP Service Pack 2 (SP2), read How do browser add-ons affect my computer?

6. Removing unwanted programs with the Add/Remove feature

If you're ready to try some advanced removal methods, the Microsoft Help and Support article Unexplained computer behavior may be caused by deceptive software provides additional steps you can take, including how to use the Add/Remove feature, the built-in program remover, and the program finder in Windows Explorer.

7. Empty the Recycle Bin when you've finished these steps, especially if you've removed an unwanted program. Then restart your computer.

Tuesday, May 18, 2010

Document folder keps open on its own at startup

The answer is a corrupted registry entry.

Run regedit and navigate to:

HKLM/SOFTWARE/Microsoft/Windows NT/CurrentVersion/Winlogon

In there there should be a value (on right hand side of screen) called Userinit.

The data for this value is probably something similar to:

C:\windows\system32\userinit.exe,C:\windows\system32\userinit.exe,

If you do see a duplicated string in there similar to the above - simply double click on the Userinit value and edit the data so as to delete everything to the right of the first comma (,). In the case above you would leave only:

C:\windows\system32\userinit.exe,

Exit registry edit and reboot. No more My Documents!