Skip to main content

How to find out and Remove Masked Viruses (Rootkits) from a Computer?

Nowadays malware are takes advanced technologies to hide their presence from virus scanners. For example, being well masked, they dodge firewalls and virus scanners, they use hidden ADS to infect a computer (ADS - Alternate Data Stream - is a good method to hide data which is attached to a regular file or directory. So, it is a great place for malware to hide), etc. This type of malware is known as Rootkit (programs, including viruses, spyware, and Trojans), which enable administrator-level access to a computer or a network system.

This dangerous programs monitors traffic and keystrokes and make a backdoor into the system for the hacker's use. Rootkits are often hiding their presence from virus scanners, so, only a scanner specialized in this type of malware can help.

Here is a good program, Radix Anti-rootkit that uses sophisticated methodologies and removes pests and manipulated drivers, system files and processes from your system.

How to use it? Download Radix Anti-rootkit (free, 162Kb), unzip and run it from a USB stick (so windows file protection doesn’t get in the way of the tool). Check all options under ‘1-click Check’ tab. Ignore all warning messages (it is advisable to back up the registry before doing anything, because in some exceptional cases it result in a malfunctioning system)

Now click on ‘Check’ button for scanning. It will take some time to finish the scanning. After all tests complete, select all to fix the problem. After all, the program will display a list of files that have been repaired and modified.

Comments

Post a Comment

Please leave your valuable comment below

Popular posts from this blog

Surf the Web Anonymously With Firefox Add-on Phproxy

There are several web based proxy servers available to surf the internet anonymously or as from another country. The Firefox add-on (Firefox 3 – 4) Phzilla helps you view a webpage or surf the internet using the PHProxy (a type of web based proxy server) proxy servers. It is very easy and convenient to use.

Restore Lost Capacity Of Your USB Flash Drive (How to)

Some malware can hide full capacity of your USB flash drive. For example, a 4GB pen drive sometimes shows only 500kb or less. An interesting part of this situation is that, even after removing the malware or formatting the USB flash drive, you will not get back its original capacity. Therefore, the question here is how to restore a USB flash drive to its full capacity.

Which is the safest browser- IE, Firefox, Chrome, Safari or Opera?

The safest way to surf the web is to pick the best browser, but how? The most important parameter while judging a browser is its security . Because of the ever growing threats via web browsers, browser developers have trying to give best security features to their browser. All major browsers have added security technologies to combat web-based threats, but, not all of them have taken the same approach, nor claim to stop the same breadth of attacks. NSS Labs , the leading independent security product testing and certification organization, has examined six major browsers- A pple Safari, Google Chrome, Internet Explorer 7, Internet Explorer 8, Mozilla Firefox, and Opera against socially engineered Malware and published a report called ‘ Web Browser Security - Socially Engineered Malware Protection ’. The report reveals that Internet Explorer 8 (RC1) is the safest one with a 69% catch rate against Malware. It was 30% in Mozilla Firefox (3.07), 24% in Apple Safari, 16% in Google Chro