• Welcome Guest, to the Spybot Forums! It's 2025, and we just upgraded our forum software.

    Today is Safer Internet Day, and with our new forum, you can finally use passkeys to login. That was about time!

    Of course, you could ask if a forum is still useful, with so many social media networks out there where you might already have an account, and met a lot of users. You can now use your login from some of those networks to log in here. And by posting here, your question and data is stored on our servers and not automatically shared with a whole social media network.

    We'll also start using the forum for small bits of information, announcements and more again.

So how did I get infected in the first place?

Status
Not open for further replies.

TonyKlein

Security Expert
Watch what you download and where from. If you insist on using a P2P program, please read File Sharing, otherwise known as Peer To Peer. (P2P)

It's important to always keep current with the latest security fixes from Microsoft. UPDATED WINDOWS

Note:

Usually one can have more than one anti-spyware, anti-malware type programs installed without issue, although one may decide to choose one resident real time protection.

The same does not apply to firewalls and anti-virus programs.

Rule of thumb is one firewall and one anti virus program installed to avoid conflicts, loss of program efficiency and system lock up due to both software products attempting to access the same files at the same time.

An Anti-Virus product is a necessity. It's a good idea to set these to receive automatic updates so you are always as fully protected as possible from the newest virus threats. Microsoft Security Essentials is also an option.

If a personal computer is infected you may post Farbar Recovery Scan Tool (FRST) and aswMBR logs in the Malware Removal Forum to receive free assistance from our volunteer analysts.
Please see the FAQ first: "BEFORE You POST"(Please read this Procedure Before Requesting Assistance)


Happy safe computing!!
 
Last edited by a moderator:
Oracle (Sun)Microsystems-Java Security vulnerability in older versions left on system

The Java SE Runtime Environment (JRE) allows end-users to run Java applications.

It is very important not only to keep Sun Java up to date, but also to remove older versions which have security holes and can be exploited by malware.

Java JRE updates/advisories thread:
http://forums.spybot.info/showthread.php?45200-Java-JRE-updates-advisories/page4

How do I uninstall Java on my Windows computer ?
http://www.java.com/en/download/uninstall.jsp

Why should I remove older versions of Java from my system?
http://www.java.com/en/download/faq/remove_olderversions.xml
 
Last edited:
14 ways to get Infected without trying

14 ways to get Infected without trying

A little bit of humour but also based on fact. ;)

1) Look for cracks, subdivided in illegal software and .....

2) Practice unsafe hex, browse the web for free pOrn

3) Look for software that adds smileys to your posts, mail etc

4) Look for kewl skins, screensavers etc

5) Look for spyware removers, concentrate on the kind that makes you pay before it removes anything

6) Install a P2P program and repeat all of the above

7) You always want the best; use p2p to download anti-virus/firewall software.

8) Do NOT pay for anything, the internet is a place where you can steal anything from everyone without even saying as much as thank you

9) Don't have/use/update antivirus/security software

10) Look for pokergames, slotmachines and other gambling outfits

11) Look for ringtones and other stuff to bling your phone

12) Click on those unexpected links and attachments in email, because you're curious...

13) Do loan your laptop to the next door neighbour for the weekend and give him your Admin account login so he can get his project done with no hassles

14) Let the Babysitter use your laptop for 'schoolwork'


Thanks to Metallica for most of those and CalamityJane, bitman, Lonny, shelf life. :D:
 
Botnets and Infected Computers

A botnet is a collection of compromised computers under the remote command and control of a criminal “botherder.” Most owners of the compromised computers are unknowing and unwitting victims. They have unintentionally allowed unauthorized access and use of their computers as a vehicle to facilitate other crimes, such as identity theft, denial of service attacks, phishing, click fraud, and the mass distribution of spam and spyware. Because of their widely distributed capabilities, botnets are a growing threat to national security, the national information infrastructure, and the economy.

“The majority of victims are not even aware that their computer has been compromised or their personal information exploited,” said FBI Assistant Director for the Cyber Division James Finch. “An attacker gains control by infecting the computer with a virus or other malicious code and the computer continues to operate normally. Citizens can protect themselves from botnets and the associated schemes by practicing strong computer security habits to reduce the risk that your computer will be compromised.”
http://www.fbi.gov/pressrel/pressrel07/botnet061307.htm

Practice safe hex, protect your computer, other netizens and yourself.
 
Optional Installs

When installing new software or updates be watchful for the inclusion of toolbars or other software. This includes browsers and add-ons which change your default homepage and/or search engine. Such may recommend fake updates and install unwanted programs without your knowledge.

Please read the End User License Agreement (EULA) and avoid clicking through in a hurry without looking for pre-checked boxes. Or you may end up with an unwanted program, one that could be time consuming to remove.

Choose a custom install if offered so one can opt-out of any unwanted third party software or additions. Some users may find the offers useful but make sure you know what you are agreeing to.
 
Last edited:
Status
Not open for further replies.
Back
Top