Welcome to my blog :)

This is a site comprised of a personal collection of notes and information serving as a single reference place for examples, tips, codes, testing, instructions, workarounds and troubleshooting with a record of external links to help during web design or managing and maintaining mobile devices and PC. I'm not a novice nor an expert...just a LittleBitGeeky here on blogspot.com

Thursday, July 24, 2014

PC Virus Programs & Clean Up Tools for Healthy System Environment

Take Control of your PC!

My Personal Program List for Antivirus, Malware Removal, Cleanup Tools and Effective System Tools. Comprised by Karen Pierce. Updated 11-26-14


Keywords: Windows PC, Freeware, Shareware, Malware Removal, Virus Protection, Virus Removal, Adware Removal, Startup and System Tray, Program Uninstaller, System Utilities, 3rd Party System Tools


Blog Sections:

Windows Configuration
3rd Party System Tools: Uninstaller
Clean Up Tools: Virus, Malware & Adware Removal
Antivirus Software: Real Time Protection
Tips to Prevent Future Hassles, Annoyances & Threats
Virus Terminology Definitions: What does that mean?



MY PERSONAL REFERENCE BLOG:  
Note that this blog is my own personal reference from information gathered on the net to help me make an informed decision about what programs I may need to have a safe and healthy PC environment. Direct quotes, opinions and test results are that of others unless otherwise stated. 

RESOURCES FOR PRO'S AND CON'S:  
The pro's and con's list are copied from PC Mag.com from the editor.  I also used CNET.com editor reviews and ratings combined with and user ratings and comments.  My final decision on which 3rd Party Programs I will use is based on a combination of all info from both these sites. PC MAG REVIEW 2014 
http://www.pcmag.com/article2/0,2817,2388652,00.asp . BACK UP USER REVIEWS FROM CNET
http://download.cnet.com/AVG-AntiVirus-Free-2014/3000-2239_4-10320142.html


My Note: 
**Marked Programs are ones I have installed on my system
++Marked Programs will be installed at a later date

Windows Configuration & Components


MY SYSTEM SPECS: 
Custom built Toshiba Satellite P750-BT4G22 Laptop with an Intel i7 Quad Core supercharged processor w/ turbo boost running on a 64 bit Windows 7 Professional platform. 

HDD: 500 GB 7200 RPM Serial ATA. 
Memory: 8GB DDR3 . 
Graphics: 1 GB GDDR3 discrete graphics memory; 
     NVIDIA GeForce GT 540M with NVIDIA Optimus Technology. 
Optical: Blu-ray Rewritable w/labelflash.  
Display: 15.6 HD widescreen LCD. 
Keyboard: Backlit Keyboard w/10-key. 
Ports: HDMI Port. (3) 2.0 USB + (1) 3.0 USB sleep & charge. 5in1 memory card reader. Wireless: WiFi 802.11 i+Bluetooth 3.0 EDR.  
Power: 6 cell Lithium Ion battery w/ 90w AC adapter. 
Color: Fusion X2 Platinum. 
External Size: 15wx9.8dx1.4h / 5.8lbs.


MSCONFIG AUTORUN CONFIGURATION: 
Take Control of AutoRun programs at start, which many of them may not be listed in the system tray. Start/Type in "Run" in search box/MSCONFIG/startup tab-uncheck all programs to not start automatically. 

CONIME.EXE - UNKNOWN PROGRAM:
MS Community Forum Note: "conime.exe is part of Windows however there is malware that will take its place so best to check for those. C:\Windows\System32\conime.exe is the location for the legitimate file however it could also have been replaced by malware."

WINDOWS FIREWALL:
Make sure it is turned on and stays on all the time.  3rd party anti-virus programs typically have their own firewall that will override the default windows firewall.
System Path: Windows / system32 / filename: WF.msc

DISK DEFRAGMENT:
Fragmentation makes your hard disk drive and removable storage devices work harder thus may slow down your computer. Disk Defragmenter rearranges fragmented data so your disks and drives can work more efficiently. It can be set to run on a schedule or manually performed. 
System Path: Windows / system32 / program file name: dfrgui.exe
or Control Panel / 

WINDOWS FEATURES ON/OFF:
FTP Default is off for File Transfer Protocol. Control Panel / Programs & Features / Turn Windows Features on/off / Internet Information Services / FTP Server (IIS Web Server also)


BROWSER SECURITY....

When your entering financial information on a website, make sure there is a "Lock Icon" in the address bar which indicates that it is a secure SSL connection and your data will be encrypted. SSL stands for Secure Socket Layer. 

Look for toggle options to save passwords, do not use cookies, automatically delete browsing history, do not track and more. 

On a regular basis, clean out your browser. Delete history. Delete cookies. Delete saved log on passwords if you want, but will have to manually log on to every site again. 

Internet Explorer:
The default windows browser.

Google Chrome:
- Chrome will show you a warning message before you visit a site that is suspected of containing malware or phishing.
- The sandbox adds an additional layer of protection against malicious web pages that try to leave programs on your computer, monitor your web activities, or steal private information from your hard drive. 
- With Safe Browsing technology enabled, if you encounter a website suspected of containing phishing or malware as you browse the web, you will see a warning.
- Chrome is automatically updated with the latest security features and fixes without any action required on your part. Passwords you want saved are always encrypted. 
- Automatic alerts  whenever a site wants to use your location information.
- Other Browser Features: Google Cloud Print connects printers to the web so you can print from anywhere and from any device. Path: In Chrome Browser / Menu Icon / Settings / Advanced Settings / Google Cloud Print / Manage


3RD PARTY SYSTEM TOOLS


UNINSTALLERS...


Using the default Windows program uninstall method only does a partial incomplete job, which IMO then makes it more difficult for another program to remove all the traces.


**Wise Program Uninstaller

I chose and installed "Wise Program Uninstaller" to get rid of unwanted or difficult to remove programs that Windows failed to analiate. In my case, it was a series of files and clutter that came as a gift with downloaded internet games. I hate it when you uninstall through Windows and you can still physically see files left and shortcuts remain on the desktop. Wise Program Uninstaller has a choice to "force" the uninstall, which worked on all programs except for one.  I wonder if I had not tried Windows Uninstall first, that Wise PU would have been able to get rid of this stubborn useless program 100%?  

So far, Wise PU has worked great and I no longer even go to the default windows uninstall section. I had issues with my PC Bluetooth paring with mobile devices and it seemed to derive from Skype, of which Toshiba had factory software, Microsoft messenger merged their IM with Skype so had extra programs with them and then the main Skype exe that I manually installed. Wise PU got rid of all Skype related programs and my Bluetooth now works as it should. I will have to re-install Skype and MS IM at a later date. 

Wise Tech Support: (unknown at this time)

CNET user rating 4.5 stars / editor rating 4.5 stars
http://download.cnet.com/Wise-Program-Uninstaller/3000-2096_4-75798277.html#ixzz34RfwcecT

CNET QUOTES:
"Wise Program Uninstaller is a lean and mean cleaning machine. We definitely prefer it over the stock Windows control panel and definitely recommend it for anyone who frequently maintains a PC.

Safe uninstall guides you through the default uninstallation process and gives you the option to remove any related files, folders, and registry entries. Forced uninstalls are used more for cases where programs are more stubborn about being removed. Wise Program Uninstaller also offers a repair option for faulty installations, though reinstalling would probably get stabler results. The interface is fairly clean: it's not too cluttered and there are no unnecessary features or buttons. One additional feature we appreciated was the ability to go directly to the registry editor for each installed program by right-clicking on an installed item.

Moreover, it also can remove the residual entries which may drive you mad. The much-anticipated Wise Program
Uninstaller has many attractive advantages such as easy to use, simple but elegant GUI, but most of all, it is compatible with Win 8 and free of charge."


FILE SHREDDERS...


Hard Disk Scrubbers for both free space scrubs and selective shredding. There's no lack of file-shredding programs out there. What they promise to do is make sure a file is actually deleted when you choose delete. They overwrite the spot where the file(s) once lived on the hard drive, enough that forensic software can't recover the data. Just be aware that the over-write adds time to file deletion, so you may sense a lag when you do a secure wipe. 

Also, don't neglect the importance of free space scrubbing, where software looks at the supposedly empty space on your hard drive and scrubs it clean. If you are going to sell your computer, for example, you can format the drive, reinstall the OS, and then use the free space scrub to ensure your old files to ensure no one restores your old files. 

1) Eraser: which can even run on a schedule you set

2) Easy Shred: which sits on the desktop for easy drag and drop deletion

3) DeleteOnClick: allows right click and delete file at once (once the scrubbing is done)

4) CCleaner: If you simply want to wipe your empty disk space, one of our favorite tools for cleaning up the crap in Windows is Piriform's CCleaner, which now supports that very option. You can set this to happen automatically with each clean or manually run the Drive Wiper from the tools menu. As with any wipe, if you've got a big drive with lots of space, you'll be waiting awhile. 

Note: check to see if AVG comes with a file shredder?


FIREWALLS...

It seems that there may be some conflicts between firewalls and AV programs, so beware and do your studies before installing.  I hate hearing about "The blue screen of death!"  If you are unsure, then maybe it's best to just use the default Windows firewall, or get an Antivirus that includes a firewall with it. 

++ZONE ALARM FIREWALL: 

Firewall PC Mag's Editors Choice

*MY NOTE: Good Stand Alone Firewall Only. Use with AVG Antivirus

*ZoneAlarm Free Antivirus + Firewall 2015 include firewall protection and other security suite features. 

*ZoneAlarm's firewall is the Editors' Choice in its category, but the antivirus component doesn't match its quality. If you're after a free suite, Comodo is a better choice. You might also choose to combine ZoneAlarm's firewall with AVG for antivirus.

ZoneAlarm Free Antivirus + Firewall 2015 includes all of the impressive firewall and privacy features found in the standalone firewall utility. To these it adds a mediocre antivirus that lacks important features found in the PRO edition. 


OTHER FIREWALLS TO CHECK INTO:

Detailed list here:
http://dottech.org/100803/windows-best-free-firewall-program-review/

ESET SMART SECURITY
Several people from "SevenForums" say they like eset real well. 
-I use Eset AV (love it) and Comodo CIS just for the firewall. They work quite well together.
- Its both a real time antifvfirus/malware and a firewall.



REMOTE DESKTOP SOFTWARE...

**TightVNC Free 

Lightweight, Fast and Reliable Remote Control / Remote Desktop Software for Android Use

I chose and installed this on my system. Will update results when I use it. 


CLEAN UP TOOLS: 

Virus, Malware and Adware Removal


WALWARE REMOVAL...

Malware means "malicious software" and could be viruses, worms or Trojan horses that will infect or destroy your computer. These can come from clicking links on a website, links in an email from spam or downloaded with something that you thought was legitimate and thus you gave them permission to install it. Malware is software installed on your machine often without your knowledge, and is designed to harm your computer or potentially steal information from your computer. Ransomware can make the desktop inaccessible, so a normal installation isn't possible. A rootkit refers to a program that hooks deeply into Windows to hide its own presence. For example, a rootkit may redirect the standard Windows function that lists files in a folder and delete its own files from the list.


**Malwarebytes Anti-Malware 2.0:

4.5 Stars / Editor Rating Excellent 

I chose and installed "Malwarebytes Anti-Malware Free" software. It is strictly a clean up tool which offers no ongoing protection, but highly recommended. Some IT agents may even use this tool to fix PC's. 

Malwarebytes Tech Support:
PC MAG said" I didn't get a chance to explore what tech-support options were available, because it just did the job quickly and efficiently, with no collateral damage " and note that this was on an infested test machine. "An infestation of "GameOver Zeus" that appeared in one of malware-infested virtual machines was my wake-up call"

Pros 
Installs and scans in Safe Mode. Chameleon technology resists malware attack. Excellent results in malware removal lab test. Improved user interface and ease of use. Integrates previously separate rootkit scan.

Cons
No real-time protection against attack with free version. (What you get with Premium is real-time protection, plus a few 
other features like scheduling of scans and updates.)

Bottom Line
When other antivirus products fail, tech support agents turn to Malwarebytes Anti-Malware 2.0. It remains a very 
effective cleanup tool, and with version 2.0 it gets significant improvements in appearance and ease of use.

PCMAG editor rating: Excellent

PC MAG'S EDITORS CHOICE: "installed on all my test systems without any problem. Admittedly, these were test systems infested with my previous malware collection."

CNET'S EDITORS CHOICE: "If you can't even get antivirus installed, give Malwarebytes Anti-Malware 2.0 a try. It's our Editors' Choice for free, cleanup-only antivirus."

11-26-14 VIRUS CALLED "WINDOWS ANTI BREACH TOOL"
Malware that infected a windows 8 machine, slipping through Norton 360 Anti-Virus. 
This rouge virus portrays to be a windows program that states all kinds of intrusions and viruses have been detected on the PC. It hijacked the registry so that this fake program will launch before the desktop loads, thus prevents access to any PC function including task manager (ctrl alt del). There is no screen escape and the only option is to "buy" this fake program upgrade. 

Instructions to Remove WABT Virus:
http://malwaretips.com/blogs/windows-antibreach-tool-removal/

Method 1: Product Registration Key Code + Use malware removal programs.
Enter Key Code to remove the WABT screen to PC access again, and then perform virus removal processes. Hit the ? on the fake program screen, then register, and enter a product key code: 0W000-000B0-00T00-E0001 or E0002 or E003

Results: This did not work for me, because internet access became blocked thus registration could not be performed. Possible cause could be from Norton AV or Windows detecting the virus and shut down internet access. 

Method 2: Registry Fix.
On a clean computer, find the REGFIX DOWNLOAD LINK at the link listed above, and save the file to a USB drive. Restart infected PC in Safe Mode with command prompt. At c:\windows\system32> prompt, type "explorer.exe" to bring up the desktop. Find and click the REGFIX file located on the USB drive. Restart in normal mode. 

Results: This halfway worked. Internet still blocked via IE app, but access gained using the Google app in windows 8. Download of virus removal programs was not permitted though. 

Method 3: Download and Run Virus Removal Programs in Safe Mode.
Since I already chose to use Malwarebytes Anti-Malware software on my own win7 system, I also installed on the infected win8 machine which is allowed in safe mode. (Alternatively, I used the clean machine to save the downloaded exe to the USB drive and installed on the win8 machine from that.)


1) SAFE MODE:
Win7, tap F8 during restart. Select safe mode with command prompt.

Win8, (win key+C), click the power button icon, sft+restart. Menu options: Troubleshoot/Advanced Options/Startup Settings/Restart/ #6 to enable safe mode with command prompt. 

2) To bring up the desktop: c:\windows\system32>explorer.exe.
3) Install Malwarebyes Anti-Malware and run the scan. Remove all threats found.
4) Restart in normal mode 
5) Update virus definitions database, perform another scan and remove threats found. If definitions won't update, restart PC again to fix any glitches. 
6) Install MS Hitman Pro Kickstart as a secondary backup. Run scan and remove any threats found. 

Results: Malwarebytes seems to have gotten all traces of the virus. Hitman Pro did not find any additional remnants. PC functions normally and internet access granted once again. 

Further Actions: 
Run scans on the clean PC and scrub the USB drive with another program. 


AUTORUN EATER: Use for External Drives

CNet User 4 Stars / Editor 5 Stars /  Highly Recommended for added security
http://download.cnet.com/Autorun-Eater/3000-2239_4-10752777.html#ixzz34QmbKnaI

Autorun Eater was born due to the increase of malwares using the 'autorun.inf' method to infect users unknowingly be it from flash drives, external hard disks or any other removable storage device.

Scans your drives for suspicious autorun.ini files and removes those you want removed. Autorun.ini files issue basic instructions for starting all kinds of programs, but malware can infect computers with them, sometimes from external drives. Autorun Eater monitors your system for suspicious autorun.ini files in the root directories of drives C through Z as well as removable drives. It also fixes three common registry errors caused by autorun.ini files and prevents the accidental execution of such files, as well as removing leftover files that can prevent removable drives from opening. It poses no known conflicts to antivirus tools and actually includes an optional anti-malware utility, Microsoft Security Essentials.

Autorun Eater scanned our C, D, and E drives as well as external drives, though we're happy to say it didn't find any serious threats. Its pop-up alerts contain a lot of information, such as whether the associated executable is present or has been deleted, and the text string. We could ignore or remove the file as needed. If you regularly bring work home or use portable drives, we highly recommend Autorun Eater for your PC security setup.


USB-AV ANTIVIRUS FREE:   3 second USB Drive Scan

CNet User 5 Stars / Editor 4 Stars
http://download.cnet.com/USB-AV-Antivirus-Free/3000-2239_4-75819661.html

Protect your USB from viruses and malware attacks. USB-AV Antivirus Free is a slim, stylish antivirus software that quickly scans any USB drive you connect. Though some antivirus software has this feature, many don't. That makes this program incredibly useful.

The program took about three seconds to scan a drive and found the EICAR test file on the drive like it should have. In addition to scanning drives, you can change how the program behaves when it finds a virus -- whether it deletes or quarantines it -- and even get pop-up notifications from the program when it needs updating or when you lose protection.



SOPHOS CLEANUP TOOL: Only use if malware prevents installation

My Note: Weebroot uses this when issues arise.

In the lab results chart, you may note that Sophos also gets high marks from the labs. However, the labs aren't testing Sophos Virus Removal Tool 2.0 directly. This cleanup-only tool isn't a full antivirus solution. Rather, it's for use in emergency, when malware prevents installation of a full solution. 


COMODO CLEANING ESSENTIALS 6: Only use if virus prevents installation of anti-virus

6: 4 Stars / Editor Rating Excellent

My Note: Best for Stand Alone Clean up tool. Full Antivirus suite is not suggested. Use only if installations cannot be completed.

Pros
No installation required. Cleanup not balked by malware. Good detection rate. Free! Comodo Cleaning Essentials foils 
attacks that fight antivirus programs with a simple countermeasure; it doesn't require installation. Download the tool,
unzip it, and launch it—that's all.

Cons
Didn't thoroughly clean up found malware. Less effective against rootkits. No realtime protection.


Bottom Line
Call on Comodo Cleaning Essentials 6 when pre-existing malware keeps you from installing or running a full-scale security 
product, especially another Comodo product. However, Malwarebytes remains our Editors' Choice for free cleanup-only antivirus.

After the update, Comodo automatically reboots the system and starts a scan as soon as Windows loads, before any rootkit-based threats can sink their hooks into the system. In most cases, the final report listed every malware traces as properly cleaned, but for a few it reported "Failed." If you find any such items in the final report, you'll need to pursue other options for cleaning. Typically, a session with Comodo Cleaning Essentials is the precursor to installing a full-scale antivirus or security suite. Once you've installed ongoing security, run a scan right away.

Comando Internet Security Premium 2013 CNET user rating 3.5 Stars / editor rating 4.5 Stars

AVG CLEAUP UP TOOL 

Stand alone tool (aside from the antivirus)  did well in testing, but had lots of issues installing it on a malware-infested test systems.


ANTIVIRUS: 

Real Time Protection


PAID ANTIVIRUS...

CNET Editor's choice for best overall antivirus

1) Bitdefender Antivirus Plus (2014) $39.95 at BitDefender

2) Norton AntiVirus (2014) $49.99 at Norton: 
My Note: I suppose this could happen with any antivirus, but Norton let a Trojan Horse slip through and invade my system with a keylogger that stole my financial information thus my bank debit card number was stolen and used.  Vendors and Bank of America alike efficiently took care of the situation.   The cops did nothing, even though I personally tracked the thief down to a specific location in Las Vegas and gave all police this information. Figures! Point is, I had the $80 subscription to the Internet Security Version of Norton when this happened. I am now going to try some AVG freeware and see if there is any difference!

3) Webroot SecureAnywhere Antivirus (2014) $19.99 at Webroot. 
My Note: Back in the day I used Webroot for many many years with no issues, but it was during a time of low risk surfing also. 

4) Kaspersky Anti-Virus (2014) $33.99 at B&H Photo-Video. With its impressive sweep of the independent labs



WEEBROOT $20-$40 

MY NOTE: SUPER FAST, SUPER SMALL, EFFICIENT, HANDS ON TECH SUPPORT. Webroot has a deal with Sophos to supply such tools at need.

Webroot SecureAnywhere AntiVirus (2014) ($39.99 per year, direct) doesn't fit with the rest at all. It installs in a flash, doesn't require signature updates, scans much more quickly, and takes a ridiculously small amount of space on disk. On top of that, its unconventional techniques do an impressive protection job. Instant Installation

Webroot's installer is famously tiny; it would fit on a 3.5" diskette, if you could find one. The installed program is hardly bigger. Launch the installer, insert your keycode, click a button, and it's off to the races. The average antivirus takes about 30 minutes to scan my standard clean test system. Webroot does the job in less than five minutes. Installing Webroot and running that scan takes less time than simply installing and updating most antivirus products. Ransomware on one of my test systems makes the desktop inaccessible, so a normal installation isn't possible. Webroot tech support guided me to their bootable rescue environment.

Unlike most, this isn't a Linux based antivirus scanner. Rather, at bootup it contacts tech support directly for a remote-control hands-on repair session. The support agent manually modified Registry entries to prevent the ransomware from launching. After that, I had no trouble with installation. Webroot installed without incident on the other eleven test systems. Next he tried a cleanup tool from Sophos; Webroot has a deal with Sophos to supply such tools at need.

Pros 
Super-fast installation includes full scan. Installed without incident on infested test systems. Scans again and again to eliminate all malware traces. Very good malware removal score. Very accurate antiphishing. Firewall manages outbound Internet access. Can't be terminated by malicious code. Handy tools help undo system changes made by malware.

Cons 
Completing malware cleanup required hours of remote-control tech support. Not compatible with some lab tests. 

Bottom Line 

The latest edition of Webroot SecureAnywhere AntiVirus remains the tiniest antivirus around. Enhanced antiphishing protection and impressive malware cleanup earned it top scores. Webroot remains an antivirus Editors' Choice.


FREE ANTIVIRUS...

Full suites are not necessarily the best choices, especially in regards to freeware.  Notes in this blog help separate the good stand alone tools if applicable. 

CNET's Main Free Choices: 
"AVG AntiVirus FREE 2014 is our current Editors' Choice for free antivirus. It shares the top score in my hands-on malware blocking test with four others, among them Avira Free AntiVirus (2014) and FortiClient 5.0 (also free). If you can't even get antivirus installed, give Malwarebytes Anti-Malware 2.0 a try. It's our Editors' Choice for free, cleanup-only antivirus."

++AVG ANTIVIRUS FREE 2014: My best overall choice but has upsell annoyances

9.4 POINTS/97%  DETECTION (highest) / 4stars / Editor Choice Excellent / CNet User 4 Stars / Editor 4.5 Stars. COMPARES TO NORTON SCORES * NUMEROUS UPSELL ATTEMPTS * DIFFICULT INSTALLATION AT TIMES * INCLUDES FILE SHREDDER * HAS TECH SUPPORT(doesnt say type) *AVG AntiVirus FREE 2014 did quite well, and in several cases the product being tested definitely was the free edition.

AVG CLEAUP UP TOOL also did well in that test, but getting it installed on my malware-infested test systems required alot of help from tech support.

AVG antivirus free detected 78 percent of the samples and scored 6.4 points, narrowly beating Norton AntiVirus (2014)$49.99 at Norton's 6.3 points. Of products tested using my current malware collection, only Bitdefender Antivirus Plus (2014)$39.95 at BitDefender and the cleanup-only Jumpshot tool did better, with 6.6 and 6.5 points respectively.

Pros 
Excellent protection against malware attack on a clean system. Effective malware cleanup. Toolbar offers secure search, Do Not Track, Facebook view, more. Includes secure deletion file shredder. Free! To ask questions and receive answers from AVG company representatives, please visit CNET's dedicated AVG Forum.

Cons 
Difficult installation on malware-infested test systems. I'm giving AVG two stars for installation experience. Some users may object to numerous upsell attempts. 

Bottom Line 
I had a bit of trouble getting AVG AntiVirus FREE 2014 installed on my malware-infested test systems, but once installed it did a good cleanup job, and it was even better at protecting an already-clean system. You'll get excellent free antivirus protection from AVG.

-------------------------------------------- CNET DOWNLOAD:
http://download.cnet.com/AVG-AntiVirus-Free-2014/3000-2239_4-10320142.html
--------------------------------------

Platform: Windows XP/Vista/7/8
Version:2014.0.4744
File Size:4.54MB
Date Added:July 15, 2014
Price: Free

     Full Version Upgrade: $39.99
     -Antivirus-Blocks viruses, spyware, & malware
     -Link Protection-Scans web, Twitter & Facebook links
     -File Shredder-Securely deletes files
     -Online Shield-Protects from harmful downloads
     -Data Safe-Encrypts & password-protects private files

     Internet Security $54.99
     -Anti-Spam-Stops spammers and scammers

     -Firewall-Blocks hackers so you can shop safely
   
During Installation Free version does not have these items checked:
-Online Shield
-Enhanced Firewall
-Anti-Spam
-Technical Support

Custom Installation Choices:
-Personal Email Scanner
-Identity Scanner
-Languages
-Web Browsing-LinkScanner Surf-Shield

Menu Options After Installation:
Automatically updates virus definitions after install

Manual Virus Scan

Fix Performance-Basic Quick Tune Up: 
-Fixes Registry Errors
-Junk Files
-Fragmentation
-Broken Shortcuts
-Option to download the trial version of 
advanced "AVG PC TuneUp " for true optimization
which is $39.99 to buy. 


Firewall (unactivated) 
-Tries to sell you Internet Security Version w/ firewall

Driver Update

Mobile & Table Protection Apps (prob more to sell)


BITDEFENDER ANTIVIRUS FREE:  Good but limited free edition

PC Mag 4 Stars / Editor Rating Excellent / Cnet has 4.5 Editor stars and 3 user stars on all software versions. * FAST EMAIL ONLY TECH SUPPORT * PAID VERSION AVAIL  * My Note: good on pc mag...questionable on cnet

* If the Bitdefender technology that was tested is actually found in Bitdefender Antivirus Free Edition (2014), that's quite impressive, as Bitdefender scored super-high in just about every test. 

* Tech support via email only for free version, but fast response.

An antivirus utility that removes and defends against viruses, Trojans, rootkits, spyware, and all types of malicious software is totally doing its job. Yes, some vendors pack all sorts of goodies into their nominally stand-alone antivirus tools, but those goodies aren't required. The relatively new Bitdefender Antivirus Free Edition (2014) sticks with the essentials, and does quite a good job. Bitdefender Free is clearly meant to be as unobtrusive as possible. There's no configuration required, none at all. This makes it a great choice for those who want an antivirus that just quietly does its job.

Offers a Rescue CD to kill malware:
Bitdefender Free's installer runs a quick scan that's intended to wipe out any active malware that might interfere with the installation process. The pre-installs scan did find problems on several test systems. I got the product up and running on eight of my twelve malware-infested test systems with no trouble. Ransomware made installation impossible on one system, and malware actively killed the installer on another. On advice from tech support, I downloaded and burned a copy of Bitdefender's impressive Rescue CD. A Rescue CD scan solved both of these problems.

Offers Anti-Malware Program:
The free Malwarebytes Anti-Malware 1.70 installed on all my test systems without any problem. Admittedly, these were test systems infested with my previous malware collection, and Malwarebytes is strictly a cleanup tool, with no ongoing protection. Ad-Aware Free Antivirus+ 10.5 also installed with little or no trouble, and it did the job on the same systems that gave Bitdefender Free so much trouble.

Bitdefender Antivirus Free Edition (2014)

Pros 
Extremely unobtrusive. Can work entirely in the background. No configuration settings. Good results in PCMag's malware blocking and removal tests. Excellent results from independent testing labs. Excellent phishing protection. Free!

Cons 
Tough installation on malware-infested systems. Tech support via email only. 

CNet User Cons: 
The free version has a number of problems but the most serious is that it will not let you restore an item placed in quarantine back to working order. It has a restore button next to each quarantined item but the button doesn't do anything in the free version. Instead, you will be forced to purchase the paid-for version in order to restore the files. If the quarantined item happens to be important to your system then you're basically screwed. There are ways to manually restore the quarantined files via Safe Mode but that's not a solution at all for most users. Cannot remove from quarantine even if marked excluded. Had to uninstall. Auto deletes at its own descression. Read more: Bitdefender Antivirus Free - Free download and software reviews - CNET Download.com http://download.cnet.com/Bitdefender-Antivirus-Free/3000-2239_4-75902507.html#ixzz34RCCsvsk

Bottom Line 

You'll hardly know Bitdefender Antivirus Free Edition (2014) is present on your system, unless it quashes a problem. Its tiny main window and unobtrusive style are great if you want a strong, silent, and free antivirus solution.


AVAST! FREE ANTIVIRUS 2014: Good but no tech support

79% URL BLOCKING (highest) / 3.5 Stars / Editior Good / CNet User 4.5 Stars / Editor 4.5 Stars 

Quote "More recently I've added a new test that relies on a super-fresh feed of malicious URLs from MRG-Effitas. I specifically use URLs that point to executable files, since that makes measuring success easy. If the antivirus doesn't block access to the URL or quarantine the file on download, it failed. As more results come in, I'll give more weight to this test. It's worth noting that the highest scores so far, 79 percent, went to avast! Free Antivirus 2014."

Pros 
Good ratings from independent antivirus test labs. Streamlined user interface. Many options for malware cleanup. Website reputation check. Do Not Track. Checks for unpatched applications. Can install and scan in Safe Mode.

Cons 
Middling score in malware-blocking test. Heuristic malware detection blocked some valid programs. Difficult to exclude wrongly-blocked programs. Phishing protection weak. 

Bottom Line 

avast! Free Antivirus 2014 boasts a newly streamlined user interface and some interesting new features. With 200 million users it's definitely a contender in the free antivirus space.
Good ratings and scores, but offers no tech support if any issues may arise.

AVIRA FREE ANTIVIRUS: Good but reports of severe collateral damage & no tech sup

PC MAG 9.4 POINTS/97%  DETECTION (highest) / CNet User 4 Stars / Editor 5 Stars

* NO TECH SUPPORT AVAILABLE * COLLATERAL DAMAGE POSSIBLE TOO

OTHER ANTIVIRUS........

MICROSOFT SECURITY ESSENTIALS:  Basic Protection Only
CNet User 4 Stars / Editor 4 Stars


Note that while Microsoft Security Essentials appears in the chart, most of the labs treat it as a baseline, not as a serious contender. Microsoft agrees; they're not trying to compete with free third-party vendors. They just want to make sure everyone has some degree of protection.

Spybot - Search & Destroy 2.0: No Longer Works
One of the 1st AntiSpyware tools ever, now proves nearly 100% to be ineffective after being dormant for many years.

Panda Antivirus: Do not install
"Doesn't work well when cut off from Internet. In testing, many additional tools for malware cleanup were needed, taking days in some cases. Phishing protection ineffective against newest threats. "

Panda offers full tech support, up to and including remote-control remediation, even for Panda Cloud Cleaner. 

The new Panda Cloud Cleaner installs in a snap and cleans quickly. It did a good cleanup job, but caused significant collateral damage, rendering one test system temporarily unbootable.

Pros 
Small and lightweight due to cloud storage of malware signatures. Many additional tools for malware cleanup available if needed. Very good at protecting a clean system against new threats.

Cons 
Doesn't work well when cut off from Internet. In testing, many additional tools for malware cleanup were needed, taking days in some cases. Phishing protection ineffective against newest threats. 

Bottom Line 
Panda Cloud Antivirus does a good job keeping malware out of a clean system, as long as your Internet connection is working. It's backed by a substantial collection of tools to help clean an already-infested system. All of them were needed to clean up infested test systems, and cleanup took days in some cases. Don't count on it for cleanup.





Tips to Prevent Future Hassles, Annoyances & Threats


IMPORTANT!...TECH SUPPORT FOR PROGRAMS

I always make sure there is some kind of tech support offered with any program I download, particularly those related to virus threats. Some free versions don't offer tech support, but rather you must pay for the upgrade in order to get that. Some doesn't offer any support at all. Some has email support and other have phone support, but in any case its a good idea to research users comments on how long it takes to reach them, response time and the end result of the issue at hand. An even better tech support option is remote-control remediation, so they can actually take a look in your system and fix problems themselves.

IMPORTANT!... NEVER DOWNLOAD FREE GAMES!

I have been fighting to get ride of 3 games downloaded from "freeridegames.com".  Although Norton AV scanned the .exe as safe, Malwarebytes detected no threat and Google searches all say they are harmless, its unwanted presence was still on my system as well as a pop up ad on my desktop itself. Wise uninstalled most but not all traces of the numerous scattered files with a host of names and target locations, both locally and online. I could never track down the root of that pop up ad either, so I ended up manually deleting the leftover folders/files after goggling many hours for  possible associated file names. A backup system copy should be made before deleting files you are not quite sure about. I suppose I should have tried an adware removal tool also, but I will be ready next time.

IMPORTANT!... ALWAYS DO CUSTOM INSTALLATIONS!

When installing new software, its best to do custom installs vs the default "easy" automatic method, because more than likely there will be selections automatically marked to add another toolbar, place ads on your system and change your browser home page to another webpage, install browser extensions and maybe even change your browser to a different one. Save yourself some anguish, and simply read all the screens during a custom install and uncheck the boxes for items you do not want.  It really doesn't take that much more time and the benefits are more than worthwhile.

IMPORTANT!....KEEP UPDATES CURRENT!

I personally do not like automatic updates because they seem to always come at an inconvenient time. Always keep any security programs like antivirus up to date though, because they are constantly adding virus definitions as new threats and malware evolve and constantly try to invade your system, potentially stealing your identity and financial information, not to mention the possibility of a complete system shut down.

IMPORTANT!....FIREWALL ALWAYS ON!:
Never turn off the firewall either.  If you do not have one, there are free options available.


TERMINOLOGY DEFINITIONS

VIRUS: A malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes. However, not all viruses carry a destructive payload or attempt to hide themselves—the defining characteristic of viruses is that they are self-replicating computer programs which install themselves without the user's consent. Android and Windows are among the most victimized. Unfortunately, no currently existing antivirus software is able to catch all computer viruses (especially new ones); computer security researchers are actively searching for new ways to enable antivirus solutions to more effectively detect emerging viruses, before they have already become widely distributed.

MALWARE: Malware means "malicious software" and could be viruses, worms or Trojan horses that will infect or destroy your computer. These can come from clicking links on a website, links in an email from spam or downloaded with something that you thought was legitimate and thus you gave them permission to install it.

WORM: A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.  A very common payload for worms is to install a backdoor in the infected computer to allow the creation of a "zombie" computer under control of the worm author. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website's address. Spammers are therefore thought to be a source of funding for the creation of such worms, and the worm writers have been caught selling lists of IP addresses of infected machines. Others try to blackmail companies with threatened DoS attacks.

TROJAN HORSE: Generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm.A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer. While Trojans and backdoors are not easily detectable by themselves, computers may appear to run slower due to heavy processor or network usage. Malicious programs are classified as Trojans if they do not attempt to inject themselves into other files like a virus or otherwise propagate themselves like a worm. A computer may host a Trojan via a malicious program a user is duped into executing (often an e-mail attachment disguised to be unsuspicious, e.g., a routine form to be filled in) or by download.

ROOTKIT: Simply put, The term rootkit refers to a program that hooks deeply into Windows to hide its own presence. For example, a rootkit may redirect the standard Windows function that lists files in a folder and delete its own files from the list. More extensively...A rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. The term rootkit is a concatenation of "root" (the traditional name of the privileged account on Unix operating systems) and the word "kit" (which refers to the software components that implement the tool). The term "rootkit" has negative connotations through its association with malware. Rootkit installation can be automated, or an attacker can install it once they've obtained root or Administrator access. Obtaining this access is a result of direct attack on a system (i.e., exploiting a known vulnerability (such as privilege escalation) or a password (obtained by cracking or social engineering)). Once installed, it becomes possible to hide the intrusion as well as to maintain privileged access. The key is the root or Administrator access. Full control over a system means that existing software can be modified, including software that might otherwise be used to detect or circumvent it. Rootkit detection is difficult because a rootkit may be able to subvert the software that is intended to find it. Detection methods include using an alternative and trusted operating system, behavioral-based methods, signature scanning, difference scanning, and memory dump analysis. Removal can be complicated or practically impossible, especially in cases where the rootkit resides in the kernel; reinstallation of the operating system may be the only available solution to the problem. When dealing with firmware rootkits, removal may require hardware replacement, or specialized equipment.

PHISHING: 
 is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.[1][2] Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware.[3] Phishing is typically carried out by email spoofing[4] or instant messaging,[5] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users,[6] and exploits the poor usability of current web security technologies.[7] Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.


BACKDOOR: A method of bypassing normal authentication, securing illegal remote access to a computer, obtaining access to plaintext and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice) or may subvert the system through a rootkit. Default passwords can function as backdoors if they are not changed by the user. Some debugging features can also act as backdoors if they are not removed in the release version.

BACK ORIFICE (BO): is a controversial computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a word play on Microsoft BackOffice Server software. Back Orifice was designed with a client–server architecture. A small and unobtrusive server program is installed on one machine, which is remotely manipulated by a client program with a graphical user interface on another computer system. The two components communicate with one another using the TCP and/or UDP network protocols. In a reference to the Leet phenomenon, this program commonly runs on port 31337.



Sources: Investigations stem from CNET.com, PC Mag.com for 3rd Party Programs and Microsoft Community for System Info and of course hours of reading all the geeky tech forums for problem resolution.


No comments:

Post a Comment