Old announcement of past promotion rounds and updates to Wolfhome.
Locked Previous topicNext topic
User avatar
Alpha - Site Owner
Alpha - Site Owner
Posts: 5417
Joined: Fri Nov 03, 2006 11:12 pm
Location: Cyberspace

Mon Feb 11, 2008 2:21 pm


You really MUST get real-time anti-spyware and anti-virus protection for your computer. You have no choice. The internet is a dangerous place for computers.

Spybot Search & Destroy is an excellent choice to prevent spyware. Make sure you do the update when you run your tests AND make sure that you are running the "Tea Timer" real-time spyware protection that comes with it! Here is the link:

Also... Go to in order to do a free web based antivirus sweep of your computer. It isn't real-time protection, but if you already have picked up a virus, it may help you to find and remove it.

Several users have recommended Avast antivirus software and while I don't have any experience with it, they do and they like it, so I am posting that link here too...

Another excellent free anti-virus program is one from Avira. This package was able to detect and clean infections that other popular programs missed. ... ivirus.htm

Finally, I don't know the proper way to keep Mac's up-to-date, but with Windows XP (and presumably Vista!) you REALLY need to keep the windows operating system updated regularly. This helps stop attacks from known exploits and it runs a "Malicious Software Removal Program" to stomp the ones that have already snuck onto your computer. <<==== IMPORTANT!!!
0 x
User avatar
Beta - Event Committee Co-Leader
Beta - Event Committee Co-Leader
Posts: 26638
Joined: Thu Dec 28, 2006 7:32 pm
Species: Meat Popsicle


Fri Sep 08, 2017 10:15 am


I hear people on here talking more and more about viruses, but nobody seems to understand that Malware is a real problem these days too, and the symptoms of Malware can look very similar to that of a virus. Without some form of malware protection you're leaving yourself wide open for a very bad day. I'll explain the difference between malware, Adware, spyware, and viruses in this post and link to some resources that will help you avoid any future problems you may experience.

First the one that's least known.


Malware is a very general word for software that deliberately harms, restricts, alters, or stops your computer from working properly where the true purpose of the download or installation is hidden or difficult to find and not clearly explained to the user. The user does not give permission for installation and use. Malware includes adware, spyware, tracking cookies and infectors (worms, viruses, Trojans, backdoors, toolkits). The basic rule for safety is to use both updated anti-spyware and anti-virus software.

Malware can arrive through an internet download, as an email link or attachment, as a file sent between users of instant messaging, social networking communities, peer-to-peer file sharing programs, online games, online video games or chatrooms or a link to a malicious webpage. Sometimes when someone downloads a "free" program from the internet, whether the program is for access to a restricted website, to play a game, or to use a peer-to-peer file sharing program, there can be compensation for the privilege of downloading the free software. This compensation can be:

Indications of Malware

Indications that some kind of malware is probably installed on your computer can be:
  • The browser’s home page keeps changing
  • Pop-up advertisements appear when your browser is closed, pop-ups immediately begin when you connect to the internet or the amount of pop-up advertisements is way too much.
  • Strange icons appear on your desktop without your prompting or knowledge of the program
  • The computer light is blinking (meaning that your computer is processing information) at unusual or unexpected times. This is difficult to observe with broadband since there is not a visual difference between incoming and outgoing data.
  • Your browser settings keep changing, including the webpage you designate as your internet start-up page
  • Files are uploaded or downloaded without your prompting or permission

Adware is pretty self explanatory so I won't say much about it.


Adware displays advertisements directed to your individual preferences based on websites you visited online, individual buying choices and the configuration of your computer’s hardware and software. This is not different than looking at an article of clothing in a store and someone continually puts a competitor’s item in your view. Adware can track your online activities, collect your web surfing habits, email addresses, and purchase preferences. It can also gather information about the hardware and software installed on your home computer and sends that information to marketers.

This monitoring can include where you go, where you shop or your web browsing preferences and habits. Companies find this information useful so they can generate advertisements customized specifically for your interests, likes, and dislikes. Adware is generating much discussion about balancing the responsibilities and rights of companies and the privacy of customers. So, be sure you read and understand all agreements before accepting them.

Spyware is probably the most known infectious type of software after virus but it's good to know exactly what it is.


Spyware is tracking software that hides itself (runs in the background) and gathers information without the computer owner's or user's knowledge or permission for the benefit of someone else. It uses the computer owner's internet connection without permission to send the collected information to whomever the tracking software designates. This is the reason every home computer should have an invalid default internet connection. Spyware can compromise the safety of your passwords, logon information, financial, or personal information. Information collected can include your online habits and preferences (where you go, where you shop, for what, how much, how often, etc), each key you press on your keyboard, passwords, logon information, account and financial information, online correspondence and conversations or whatever information is stated in the agreement.

What spyware and malware have in common is the ability to collect and distribute your personal information without your permission. Malware can also send and make computer resources and information available to unknown recipients or remote users without your knowledge or permission. Both spyware and malware are possible methods for identity theft since the computer owner or user does not know about or does not provide their permission for the installation and use of the hidden program or file.

Unauthorized software installation without the computer user’s or owner’s permission can include:
  • Programs designed to help steal personal user information to commit identity theft without the user or owner of the computer providing their permission to do so.
  • Botnets – an unlimited number of computers infected with a program designed to simultaneously attack another computer or network without the knowledge or permission of the owner of each infected computer.
  • Disabling security without the computer owner or user providing their permission
  • Endless loop pop-up advertisements or adware when the computer user or owner does not deliberately activate the software either through an installed program or through understanding an End-User License Agreement.
  • Denial of Service attacks
  • Modem Hijacking – the computer user can incur financial telecommunication charges without their prior permission
  • Changing browser settings without the computer owner’s or user’s permission
  • Evading uninstalls by deceptive or unfair means
  • Falsifying options for uninstallation
  • Installing personal and financial information collection features without the computer owner’s or user’s permission
  • Installing keystroke logging software on a computer used or owned by someone whom you are not responsible for their safety and conduct .
Guidelines to Avoid Spyware

Follow internet safety guidelines including:
  • Not opening emails or email attachments from unknown senders
  • Block or don’t click on suspicious pop-up windows
  • Don’t open files that are more prone to be associated with malware such as .bat, .com, .exe, .pif, .txt.vbs, .htm.exe or .
  • Don’t download or execute applications from untrusted sources.
  • Avoid phishing scams.
  • Use updated anti-virus and anti-spyware software regularly.
The most well known and last topic is a computer virus. Most of you should already know what they are so I'll keep this part short and simple.


A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk.

Computer viruses are most easily spread by attachments in e-mail messages or by instant messaging messages. Therefore, you must never open an e-mail attachment unless you know who sent the message or unless you are expecting the e-mail attachment. Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread by using downloads on the Internet. Computer viruses can be hidden in pirated software or in other files or programs that you may download.

symptoms of a computer virus:
  • The computer runs slower than usual.
  • The computer stops responding, or it locks up frequently.
  • The computer crashes, and then it restarts every few minutes.
  • The computer restarts on its own. Additionally, the computer does not run as usual.
  • Applications on the computer do not work correctly.
  • Disks or disk drives are inaccessible.
  • You cannot print items correctly.
  • You see unusual error messages.
  • You see distorted menus and dialog boxes.
  • There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension.
  • An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted.
  • An antivirus program cannot be installed on the computer, or the antivirus program will not run.
  • New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.
  • Strange sounds or music plays from the speakers unexpectedly.
  • A program disappears from the computer even though you did not intentionally remove the program.

As you may have noticed some of the symptoms between spyware, malware, and viruses are the same. That's why it's a good idea to have software that will scan all your computer for all of them. Now I will list some free software that I've personally used. I've linked these before in another post I believe, but just to make sure I'll post them again here.

the best Malware scanner is MalwareBytes: ... 320cfd36ba

the best spyware scanner is Spybot Search and Destroy: ... 046b26737f

the best virus protection is Avast antivirus: ... 5f11a15bf8

**This post was originally created by Mif - thank you Mif!**
0 x
User avatar
Beta - Event Committee Co-Leader
Beta - Event Committee Co-Leader
Posts: 26638
Joined: Thu Dec 28, 2006 7:32 pm
Species: Meat Popsicle


Fri Sep 08, 2017 10:16 am

Recently there seems to have been an outbreak of rogue antivirus programs. These programs are NOT legitimate, and are just spyware in disguise.

How do you tell the difference? Here are some tips:
1) Does this program look familiar? Even if it says "Windows 7/XP/Vista Antivirus", if it's NOT something that came with your computer, or something you DON'T specifically remember downloading and installing, do not trust it.
2) How annoying is the program? Your average antivirus program periodically scans, and let's you know if there's anything you need to take care of. If you choose to click the x and ignore it, it will stop. However, these fake "antivirus programs" will literally HARASS you! Pop-up after pop-up, until you want to rip your hair out.
3) Does the program push you to purchase a full version? If it's telling you about all these problems, and urging you to make a purchase for them to go away, then it's clearly a scam!
4) Does the program keep you from accessing sites which you know are safe? Can you not see any pages, for that matter? This is a common ailment, where it claims it's protecting you by blocking these pages, when in fact it's another way for the program to corner you.

Think you've been infected? Then listen up, because there are some things you should know!
1) DO NOT under any circumstance PURCHASE THIS PRODUCT! It's a waste of your money, it keeps the program on your computer, and frankly your computer may become a zombie which is a potential threat to us all. Confused? Look it up!
2) Act fast! Once your computer is infected, it's typically a downhill ride from there. Defend yourself as quickly and effectively as possible.
3) You're going to need a legit antivirus program that can detect and get rid of most potential threats. I use and STRONGLY recommend Malwarebytes, which you can download here. Even if you don't have a problem and are just reading this out of boredom, I still recommend it. It's free, safe, powerful, quick, and it may just save your butt down the line. You can thank me later.

Now then, I'm sure you'd like to know how to remove it, right!? These things are a HUGE pain, I know! Luckily, 99% of the time, these aren't going to be the end of you or your computer.

First off, restart your computer. Tap F8 as it's starting up again, and you'll reach a black screen with white text(sometimes a couple more colors, but it's a pretty simple layout). Your mouse is useless here, so use the arrow keys, go to "Safe Mode with Networking" and hit the enter key.

Safe mode keeps the computer from launching programs it shouldn't, usually. However, sometimes the program will still be running. This is rare, though. Anyway this is the time to think fast and be smart!

Hurry online and google the name of the program. You'll come up with tons of links containing information on it, and if it's a rogue program, you'll get lists of ways to get rid of it!

Usually sites tell you the usual for healing an infected computer - destroy the process with the task manager, use a REAL antivirus program to scan and kill it asap, and fix your registry just in case. For these particular problems, though, you may have the option of temporarily disabling the program by providing a "safe key", thereby tricking the rogue program into thinking you actually wasted money on their BS. Neat, huh?

The most common one going around is part of a group, and I've had the pleasure of ridding it from my girlfriend's laptop recently. It's rumored to be from, but that hasn't been validated. All the names it goes by can be found below, and you can bet there's more to come:
Windows 7
Win 7 Anti-virus (2011)
Win 7 Anti-Spyware (2011)
Win 7 Home Security (2011)
Win 7 Total Security (2011)
Win 7 Security (2011)
Win 7 Internet Security (2011)

Windows Vista
Vista Anti-virus (2011)
Vista Anti-Spyware (2011)
Vista Home Security (2011)
Vista Total Security (2011)
Vista Security (2011)
Vista Internet Security (2011)

Windows XP
XP Anti-virus (2011)
XP Anti-Spyware (2011)
XP Home Security (2011)
XP Total Security (2011)
XP Security (2011)
XP Internet Security (2011)

Anyway, this topic is about rogue spyware in particular, so I should stop now before I digress.

I hope this helped some of you!

If you have any questions, or need further assistance, PLEASE don't be afraid to ask! This isn't my profession but I know how to handle these things, and will be more than happy to help.

Got something to add, or know a way to improve the article? Found a typo or a problem with something I posted? Go ahead and PM me or post here, and I'll edit the topic!

Thanks for reading. :)

**Original post written up by Galagya - Thank you Galagya!**
1 x
Locked Previous topicNext topic