Thursday, 21 May 2009

Email From Nikhil - NortonLive Spyware & Virus Removal Specialist

from Nikhil hide details 19 May (2 days ago)
to idris74@gmail.com
date 19 May 2009 02:12
subject NortonLive - Spyware & virus removal services <493002815>
mailed-by services01.norton.com

IDRIS AHMAD,

This is Nikhil from NortonLive. It has been my pleasure to work with you on your services request. Based on our conversation, your case, Priority ID 493002815 , has been resolved and I have closed the case.

If you feel that the issue is not resolved, you can re-open your services request. To do so, please click here or send email to and provide a brief explanation of your concern. We will contact you within 24 hours and provide further assistance.

Providing our customers with the highest level of service is important to us. You will receive a customer satisfaction survey once this case is closed. We encourage your feedback on this survey to help us continue to improve our services. You can also contact my manager at symantecmanagers@services01.norton.com to provide your feedback for this call.

Thank you for using NortonLive.

Nikhil
NortonLive Spyware & Virus Removal Specialist

Note: If you have any future Virus or Spyware problems, please contact NortonLive by clicking the 'Start Chat' button on the following web page:

http://www.symantec.com/norton/support/premium_services/premium_virus.jsp

Virus-Virus Yang Beranak Dalam MyPC

1. Spyware C:/windows/system32/iesetup.dll Spyware.IEMonster.d Steals passwords from Internet Explorer, Mozilla Firefox, Outlook and other programs.
2. Adware autorun Zlob.PornAdvertiser.ba Adware that displays pop-up/pop-under advertisements of pornographic or online gambling Web sites.
3. Spyware autorun Spyware.IMMonitor Program that can be used to monitor and record conversations in popular instant messaging applications.
4. Backdoor C:/windows/system32/svchost.exe Win32.Rbot.fm An IRC controlled backdoor that can be used to gain unauthorized access to a victim's machine.
5. Trojan autorun Infostealer.Banker.E Steals sensitive information from the infected computer (e.g. logins and passwords from online banking sessions).
6. Dialer C:/windows/system32/cmdial32.dll Dialer.Xpehbam.biz_dialer A Dialer that loads pornographic material. The url information shows Hardcore Pornographic pages.
7. Spyware autorun Spyware.KnownBadSites Uses the Windows hosts file to redirect your browser to a malicious site when you try to access a valid site.
8. Trojan autorun Trojan.Tooso Trojan.Tooso is a trojan which attempts to terminate and delete security related applications.
9. Trojan C:/windows/system32/explorer.exe Trojan.MailGrabber.s Trojan horse that gets access to e-mail accounts on the infected computer.
10. Trojan C:/windows/system32/alg.exe Trojan.Alg.t Trojan program that can compromise your private information stored on the hard drive.
11. Rogue C:/Program Files/TrustedAntivirus TrustedAntivirus A corrupt and misleading anti-virus program that may be usually installed with the help of malcous Trojans and other malware
12. Rogue C:/Program Files/SecurePCCleaner SecurePCCleaner Rogue Security Software: fake Security software that uses deceptive means for installation and purpose.
13. Trojan C:/windows/system32/ Trojan.BAT.Adduser.t This Trojan has a malicious payload. It is a BAT file. It is 1129 bytes in size.
14. Spyware C:/windows/system32/ Spyware.007SpySoftware Program designed to monitor user activity. May be used with or without consent.
15. Trojan C:/windows/hidden/ Trojan.Clicker.EC Trojan.Clicker.EC is an information stealing Trojan that masquerades as a legitimate system file so as to avoid detection and subsequent removal.
16. Dialer C:/windows/hidden/ Dialer.Trafficjam.a Dialer.Trafficjam.a is a premium-rate phone dialer that automatically invokes paid access to various porn-related Web sites.
17. Trojan hidden autorun Trojan.Poison.J Trojan.Poison.J is a key-logging Trojan for the Windows platform.
18. Adware Registry Adware.eXact.BargainBuddy A browser helper object that monitors internet browsing sessions in an attempt to redirect search queries and distribute unsolicited advertisements.
19. Worm C:/windows/system32/ Win32.Delbot.AI Win32.Delbot.AI is a worm and IRC backdoor that exploits system and software vulnerabilities in order to provide remote access to the host PC.
20. Worm C:/windows/temp/ Win32.Sdbot.ADN A worm and IRC backdoor that exploits system and software vulnerabilities in order to provide unmitigated remote access to the host machine.
21. Trojan C:/windows/ Trojan-Dropper.Win32.Agent.bot This Trojan is designed to install and launch other malicious programs on the victim machine without the knowledge or consent of the user.
22. Worm C:/windows/temp/ Win32.Rbot.CBX A worm and IRC backdoor that exploits system and software vulnerabilities in order to provide unmitigated remote access to the host machine.
23. Spyware autorun Win32.PerFiler Win32.PerFiler is designed to retrieve and install files when executed. Win32.PerFiler is configured to download from either a designated web or FTP site.
24. Worm hidden autorun Win32.Miewer.a A Trojan Downloader that masquerades as a legitimate system file. Associated processes connect to the Internet to download additional malicious files.
25. Trojan C:/windows/ Trojan-Downloader.VBS.Small.dc This Trojan downloads other files via the FTP protocol and launches them for execution on the victim machine without the user’s knowledge.
26. Worm autorun Win32.Peacomm.dam A Trojan Downloader that is spread as an attachment to emails with news headlines as the subject lines which downloads additional security threats.
27. Trojan C:/windows/system/drivers/ Win32.Spamta.KG.worm A multi-component mass-mailing worm that downloads and executes files from the Internet.
28. Trojan C:/windows/system/drivers/etc/ Trojan.IRCBot.d A worm that opens an IRC back door on the infected host. It spreads by exploiting the Windows Remote Buffer Overflow Vulnerability.
29. Trojan C:/windows/system/mui/ Trojan.Dropper.MSWord.j A Microsoft Word macro virus that drops a trojan onto the infected host.
30. Trojan C:/windows/system/mui/ Win32.Clagger.C This is small Trojan downloader that downloads files and lowers security settings. It is spreading as an email attachment.
31. Worm C:/windows/system/ Worm.Bagle.CP This is a "Bagle" mass-mailer which demonstrates typical "Bagle" behavior.
32. Worm C:/windows/ Win32.BlackMail.xx This dangerous worm will destroy certain data files on an infected user's machine on February 3, 2008.
33. Trojan hidden autorun Trojan.Win32.Agent.ado Trojan downloader that is spread as an attachment to a spam email and tries to download a password stealer.
34. Trojan autorun Win32.Outsbot.u A backdoor Trojan that is remotely controlled via Internet Relay Chat (IRC). It exploits Sony Digital Rights Management (DRM) software to hide its presence.
35. Spyware autorun Win32.PerFiler Win32.PerFiler is designed to retrieve and install files when executed. Win32.PerFiler is configured to download from either a designated web or FTP site.
36. Worm hidden autorun Win32.Miewer.a A Trojan Downloader that masquerades as a legitimate system file.
37. Trojan C:/windows/ Trojan-Downloader.VBS.Small.dc This Trojan downloads other files via the FTP protocol and launches them for execution on the victim machine without the user’s knowledge.
38. Worm autorun Win32.Peacomm.dam A Trojan Downloader that is spread as an attachment to emails with news headlines as the subject lines which downloads additional security threats.

Source:
Nikhil
NortonLive Spyware & Virus Removal Specialist

Tuesday, 19 May 2009

Tips Supaya PC Tak Kena Attack Oleh Virus

Please visit these web pages for tips that can help you avoid further infections on your computer:
http://www.symantec.com/home_homeoffice/security_response/secureemail.jsp
http://www.symantec.com/home_homeoffice/security_response/browsewebsafely.jsp
http://www.symantec.com/home_homeoffice/security_response/safeguardim.jsp
http://www.symantec.com/home_homeoffice/security_response/filesharingprotection.jsp

Do not leave a floppy disk in the floppy disk drive when you shut down or restart the computer.
Be suspicious of email attachments from unknown sources.
Verify that attachments have been sent by the author of the email. Newer viruses can send email messages that appear to be from people you know.
Do not set your email program to "auto-run" attachments.
Obtain all Microsoft security updates.
Back up your data frequently. Keep the write-protected media in a safe place—preferably in a different location than your computer.
Trust only alerts from Norton if it says that your system is infected

If a pop up window opens up, always close it by clicking on the cross mark on the top right corner. Do not use other ways, such as clicking on buttons like 'Cancel' to close the popup.

Always read the License Agreement carefully before installing any software from the internet. Usually free software’s or sharewares are associated with viruses. These software’s appear to be legitimate, but infact they are related to viruses/spywares. Typical examples are 'Winfixer', 'WinAntivirus', 'Error safe', 'Drivecleaner' etc.
Do not open any e-mail that seems suspicious
Always keep your antivirus & windows up to date by downloading the latest updates
Use Norton Internet Security to proactively protect from spyware and other security risks.
Configure the firewall in Norton Internet Security to block unsolicited requests for outbound communication.
Do not accept or open suspicious error dialogs from within the browser
Spyware may come as part of a "free deal" offer - do not accept free deals
Always read carefully the End User License agreement at Install time and cancel if other “programs” are being installed as part of the desired program
Keep software and security patches up to date

Use common sense. It's always better to err on the side of safety. If you're unsure about an attachment, delete it. Especially if it's from a source you don't recognize. If there are tempting animations on a site that look highly unprofessional, don't download them.

Scan files for viruses before using them. This is always important, but especially if you are using a disc or flash memory to carry information between one computer and another. You could easily pick up a virus from a corrupted file and introduce it into your system. Running a virus scan before launching any of new files will prevent infection.

Don't share data CDs. Even a well-meaning friend may unknowingly pass along a virus, Trojan horse, or worm. Label your discs clearly so you know they're yours and don't loan them out. If a friend passes you a foreign disc, suggest an alternative method of file sharing.

Don't boot from an unknown data CD. Data CDs are one of the most common ways viruses are transmitted. If you are using a data CD while working on your computer, remove it when you shut the machine off or the computer may automatically try to boot from the disc, perhaps launching or installing bad programs or files on your computer.

Don't download programs from the Web. Unreliable sources such as Internet newsgroups or Web sites that you haven't heard of may be willing providers of viruses for your computer. Avoid downloading files you can't be sure are safe. This includes freeware, screensavers, games, and any other executable program—any files with an ".exe" or "".com" extension, such as "coolgame.exe." Check to see if the site has anti-virus software running on their side. If you do have to download from the Internet, be sure to scan each program before running it. Save all downloads to one folder, then run virus checks on everything in the folder before using it.

Update your anti-virus software frequently. An anti-virus program is only as good as the frequency with which it is updated. New viruses, worms, and Trojan horses are born daily, and variations of them can slip by software that is not current. Norton Antivirus has a feature that searches for new virus definitions every time you go online, so you are always up to date.

Get immediate protection. Configure your anti-virus software to boot automatically on start-up and run at all times. This will provide you back-up protection in case you forget to scan an attachment, or decide not to. And in case you forget to boot up your anti-virus software, configuring it to start by itself will ensure you get immediate protection anyway.

Scan all incoming email attachments. Be sure to run each attachment you plan to open through the anti-virus check. Do this even if you recognize and trust the sender; malicious code, like Trojan horses, can slip into your system by appearing to be from a friendly source.

Don't automatically open attachments. Be sure your email program doesn't automatically download attachments. This will ensure that you can examine and scan attachments before they run. Refer to your email program's safety options or preferences menu for instructions.


Install reliable anti-virus software. Anti-virus software scans files regularly for unusual changes in file size, programs that match the software's database of known viruses, suspicious email attachments, and other warning signs. It's the most important step you can take towards keeping your computer clean of viruses. Norton AntiVirus is the world's leading anti-virus software. It runs continuously in the background of your computer, providing constant protection from viruses, Trojan horses, worms, and other malicious code. To stay up-to-date on the latest online threats, Norton AntiVirus automatically updates its virus definitions whenever you're online.
Avoid clicking on any Advertisement Popups on the Internet. They are mostly related to Adware & Spware. Trust only alerts from Norton if it says that your system is infected If a pop up window opens up, always close it by clicking on the cross mark on the top right corner. Do not use other ways, such as clicking on buttons like 'Cancel' to close the popup. Always read the License Agreement carefully before installing any software from the internet. Usually free softwares or sharewares are associated with viruses. These softwares appear to be legitimate, but in fact they are related to viruses/spywares. Typical examples are 'Winfixer', 'WinAntivirus' etc. Do not open any e-mail that seems suspicious. Always keep your antivirus & windows up to date by downloading the latest updates.

Keep your system up to date with Microsoft Windows Update to protect your system from viruses and worms that attack known Windows security vulnerabilities. Install Anti-Virus and Anti-Spyware software and keep the virus and Spyware definition files current. Install a hardware or software Firewall to help block unwanted access to your system. Microsoft Windows XP comes with a built-in software Firewall which you can enable. Protect your system against unwanted pop-ups by using Windows XP SP2 featuring Pop-Up Blocker for Internet Explorer. Practice safe computing habits on the web. Read any Pop-up messaging, advertisements, and End User License Agreements (EULA) carefully. Never give out personal information (including e-mail addresses) unless it is required to obtain service or a product from legitimate companies.

Avoid clicking on any links that you are not sure who the sender is and/or if you are not sure where the links may send take you to. This applies to all links including links sent in an e-mail, Instant Messaging (IM), Chat services, unfamiliar web pages, etc. Do not open e-mails with questionable or unexpected subject lines. Strange subject lines usually indicate something suspicious, such as a virus. They use clever titles to mass market their destructive viruses, worms, and Trojan horses. Delete suspicious e-mails immediately, and be sure to delete chain e-mails and junk e-mail (known as Spam) as well. Use hard to guess passwords. Password protecting your computer is the simplest and most common way to ensure that only those with permission can use your computer or certain parts of your computer network. Just be sure to choose a hard-to-guess password.

Make passwords as meaningless as possible. Change passwords regularly. Never divulge passwords to anyone. Never share files with strangers (doing so opens your computer up to potential hacker attacks). Beware of Hoaxes. Virus Hoaxes are false announcements about viruses. Virus Hoaxes occasionally obtain instructions for "cleaning" or deleting a virus from a computer, but the instructions may involve deleting essential Windows files, and have nothing to do with viruses at all. I hope these guidelines would be helpful for you.

Source: www.symantec.com

Tuesday, 12 May 2009

Tujuh Kesalahan Dalam Menggunakan Kad Kredit

1 : Tidak melunasi seluruh bil kad kredit
2 : Menganggap kad kredit sebagai kad debit (ATM)
3 : Menggunakan kad kredit untuk membayar hutang
4 : Tiada disiplin mengawal penggunaan kad Kredit dan bilnya
5 : Memiliki terlalu banyak kad Kredit
6 : Menganggap kad Kredit sebagai ‘Wang Tambahan’
7 : Menggunakan kad kredit untuk SEMUA belanja dan pembayaran

1 : Tidak melunasi seluruh tagihan kad kredit
Ini boleh dikatakan merupakan penyebab utama mengapa banyak orang yang terjerat dalam hutang kad kredit. Tidak sedikit orang yang hanya membayar sejumlah “pembayaran minimum”. Ketika anda melakukan ini, maka baki hutang yang tersisa akan terkena bunga yang sangat tinggi. Ketika anda melakukan kesalahan ini, maka ibaratnya anda sudah mengambil langkah pertama untuk masuk ke dalam jeratan hutang kad kredit. Lunasi seluruh tagihan kad kredit anda!!!

2 : Menganggap kad kredit sebagai kad debit (ATM)
Ini merupakan salah satu kesalahan yang paling fatal dalam menggunakan kad kredit. kad Kredit bukanlah kad Debit (ATM). Hindari menarik wang cash dengan menggunakan kad kredit karena ini akan dikenakan bunga dan biaya tarik tunai yang sangat tinggi (bahkan lebih tinggi daripada angka yang saya tuliskan di kesalahan no 1).

3 : Menggunakan kad kredit untuk membayar hutang
Kad kredit termasuk ke dalam jenis hutang “Unsecured Debt”. Hutang semacam ini dikenakan bunga yang tinggi. Oleh karena itu hutang semacam ini tidak tepat dipakai untuk modal bisnis karena akan sangat membebani kedudukan kewangan bisnis anda.
Kesalahan lainnya yang tergolong ’serupa’ adalah menggunakan kad kredit untuk menutup ataupun membayar hutang “Secured Debt”/hutang yang menggunakan jaminan. Hutang yang menggunakan jaminan, bunganya secara umum lebih ringan. Oleh sebab itu jika anda menggunakan kad kredit untuk membayar hutang ini, berarti anda malah ‘menukar’ hutang yang bunganya lebih ringan dengan hutang yang bunganya lebih berat. Salah satu ‘malapetaka’ terbesar dalam menggunakan kad kredit terjadi ketika kesalahan no.2 dan kesalahan no.3 ‘dikombinasikan’. Contoh paling umum ‘malapetaka’ seperti ini adalah ketika pemegang kad kredit mengambil wang tunai dengan kad kredit yang satu untuk membayar tagihan kad kredit yang lain.

4 : Tiada disiplin mengawal penggunaan kad Kredit dan tagihannya
Tentukan batas maksimum yang boleh anda ‘gesek’ setiap bulannya. Kawal dan catat setiap pemakaian kad kredit anda setiap hari. Ketika jumlah pemakaian tersebut sudah mendekati batas maksimum yang anda tentukan. Masih terkait dengan kesalahan no 4 ini, adalah tiada disiplin dalam pembayaran kad kreditnya. Jangan menunggu hingga hari batas terakhir untuk melunasi kad kredit anda, karena jika di hari tersebut anda sibuk/lupa/ada urusan mendadak, maka mungkin bilk ad kredit tidak terbayar.

5 : Terlalu banyak memiliki kad Kredit
Semakin banyak kad Kredit yang anda miliki, semakin sulit bagi anda untuk mengontrol pengeluaran masing-masing kad kredit. Dalam pelunasan kad kredit pun anda akan lebih direpotkan karena perlu mengingat tanggal pelunasan masing-masing kad agar tidak terlambat bayar. Beberapa financial planner menyarankan untuk memiliki kad Kredit maksimal 3 saja. Kalau lebih dari itu, mungkin mulai bisa mempertimbangkan untuk menggunting sisanya.

6 : Menganggap kad Kredit sebagai ‘Wang Tambahan’
Meskipun kedengarannya sulit dipercaya, tetapi tidak sedikit orang yang menganggap kad Kredit sebagai wang Tambahan. Ketika permohonan kad kreditnya disetujui, mereka pun kegirangan seperti mendapatkan ‘durian runtuh’. Seringkali ini lalu berujung dengan ‘pesta belanja’ menggunakan kad kredit baru tersebut. Memiliki kad kredit bukanlah berarti bahwa anda mempunyai lebih banyak wang untuk dibelanjakan. Kad kredit 'malapetaka’ jika anda tidak bijak dalam menggunakannya, ingatlah bahwa kad kredit hanyalah merupakan alat bantu pembayaran dan bukan pendapatan tambahan. Anda bisa berhutang kepada bank dengan menggunakan kad kredit, tetapi cepat atau lambat hutang kad kredit tersebut tentu harus anda bayar.

7 : Menggunakan kad kredit untuk SEMUA belanja dan pembayaran
Tidak sedikit orang menggunakan kad kredit untuk semua jenis pembelanjaan. Padahal, untuk beberapa jenis produk, akan lebih baik jika dibeli dengan menggunakan wang Cash. Ketika anda berbelanja dengan kad kredit, pihak penjual barang akan dikenakan biaya sebesar 2,5-3% dari harga transaksi itu oleh pihak bank. Untuk beberapa jenis produk (terutama yang margin labanya kecil), penjual barang tidak bersedia menanggung biaya tersebut, sehingga mengoper biaya tersebut kepada pembeli (alias anda). Biasanya dalam kasus seperti ini, penjual akan mengatakan bahwa ‘Kalau memakai kad kredit, kita kenakan charge X %’. Pada saat ini, biasanya charge ini sebesar 3,5%. Jika anda tetap membelinya dengan cara seperti ini, anda telah membayar bunga 3,5% hanya untuk ‘menunda’ sebentar membayar belanjaan itu. Padahal wang anda yang anda taruh di tabungan mendapatkan bunga yang jauh di bawah itu. Bahkan jika penjual barang tersebut tidak mengenakan caj, cubalah untuk bertanya apakah ada diskaun untuk pembelian cash. Seringkali anda akan mendapatkan potongan harga yang lumayan untuk pembelian dengan menggunakan wang Cash.

Sumber:
http://janganserakah.com/