YOUR EMAIL HAVE WON THE 2011 BBC MERIT AWARD!!!
This is the content of email :
BBC NATIONAL LOTTERY
14 16 23 24 27 39 BONUS 43
Incoming search terms:
- 2011 BBC UK Email Award
- it is obvious that this notification will come to you as a surprise but please find time to read it carefully as we congratulate you over your success
- yahoo bbc prize award
- what is bbc_lotto@libero it on my email this froud thing
- uk police emoticon
Everybody know facebook, the biggest social networking on earth that connects over 500 million people and consider more than one billion pieces of content shared every day. people on facebook can Friend, Chat, share Status Updates, post Comments, share Links, tag Photos, post Videos, join Groups, create Pages, design Polls, and play together using Applications. They use Facebook to promote causes, interests, and themselves! Facebook allows the world to be more open and connected by giving its users the tools to interact and share in any conceivable way.
Well… everybody know facebook…
everybody love to spend time play game on facebook…
but… not everybody alert with dangerous side on facebook…
account thieves, scammer, crackers etc is watching you… Read more…
Stuxnet, a terrible virus that was late last year for attacking a nuclear facility has been reborn. This time, malicious programs have different goals. Genetics Stuxnet Virus name is Duqu successfully picked up by one of the computers in the European region. While Duqu look the same but have different characteristics than the “parents”.
The most difference between Duqu and Stuxnet is, Duqu not made to attack the nuclear engine in the industry, but more focused on the theft of information and the ability to check the vehicle. Based on the information on the official blog of Symantec Duqu new viruses are found in a number of specific plant, and there is no evidence of massive attacks. But this virus should be cautious.
What is Rootkit.Duqu.A ?
Rootkit.Duqu is a new generation of Stuxnet combines advanced keylogger and backdoor application. Because of its rootkit technology, the piece of malware remain hidden from the user, the operating system and even the defense mechanism of the normal anti-virus programs.
Like stuxnet, Rootkit.Duqu.A goes digital with a stolen digital certificate that was revoked in the meantime signed. This makes it possible to install both 32 – and 64-bit operating systems on Windows platforms from Windows XP to Windows 7. The Duque rootkit running on the computer for 36 days and gather any information from the keyboard, including passwords, e-mail or IM conversations. After the “Monitoring” ends, remove the rootkit itself gracefully from the system, along with the keylogging component.
How to remove Rootkit.Duqu.A ?
Rootkit malware is difficult to detect, as it manages to subvert the operating system before it is fully loaded. Rootkit removal can be challenging even for some antivirus solutions, so manual removal is not recommended. Thanks god BitDefender offer a free and fully automated removal tool that takes care of everything for you. You only have to download and run it on the system, then reboot the PC if infection is found. Here is step by step how to use Duqu Removal from BitDefender : Read more…
Incoming search terms:
- duqu remover
- duqu virus removal
- get rid stuxnet virus
- how do you get rid of stuxnet virus
- remove duqu virus
We have all conditions for the virus include worms, Trojans and spyware, but few of us knows the difference between them. We generally for everything that is detected with anti-virus as a virus. The Antivirus offers not only protection against viruses, but also protects against worms, trojans and spywares. All it can be harmful for your computer hardware and software.
Ok Let’s start with the introduction of viruses
Virus: the virus is a self-replicating program that run on the executable file file.When that the virus is executed automatically receives and enters the system memory, once you arrive in the store or other files that are infected can. or stay in the background, infecting files used by the virus are infected programs.
Worms: Worms are similar to viruses, but they differ in a way that do not bind to executable files, rather than to reproduce itself uses network.If find excessive use of network bandwidth, it can be infected a user must perform to worm.So donot any file whose execution is possible to work without user intervention. Read more…
Incoming search terms:
- computer virus
- not everything is a virus
- virus bye bye jack sparrow