Self-checking- troubleshoot the computer virus
First, the process. The first thing we should troubleshoot is the process, the method is simple, after booting, do not start anything! Directly open the Task Manager, and see if there is suspicious process, if there are any process you don’t know, Google it. PS: If the task manager is suddenly gone after opening, you can determine your PC is infected.
Second, startup items. Now the process is completed, if no abnormalities were found, we begin to troubleshoot the startup items. Use msconfig to see if there are suspicious service, Start - Run - type "msconfig" - OK - switch to the Services tab - check the "Hide All Microsoft Services" check box, and then check one by one the rest of the service to confirm whether it is normal (you can determine by your own experience, or you can use the search engine). PS: If you find any exception, your PC can be determined as infected.
Third, the safe mode. Reboot, directly into the safe mode, if you can not enter, and a blue screen shows up, you should be vigilant, this may be the sequela of virus invasion or you may have not cleared the virus!
Fourth, the image hijacking. Open the Registry Editor, locate to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsNTCurrentVersionImageFileExecutionOpti, see if there is suspicious image hijack item, if you find a suspicious item, it may have been infected. PS: This step needs to use the registry editor, to be extremely note that once you accidentally edit the registry wrong you will need an master registry tool to determine and fix the wrong registry entries.
Five, CPU time. If your system is running slow after booting, you can also use CPU time as a reference, find the suspicious process, the method as follows: Open Task Manager, switch to the Processes tab, click "View" in the menu, Select “Columns", check the "CPU time" and then click OK, click the title of CPU time to sort, finding the larger CPU time process in addition to SystemIdleProcess and SYSTEM, this larger process should attract you a certain vigilance.
Lenovo Group established a subsidiary to develop Internet cellphone business
According to the news source on October 15 that Lenovo Group has announced to establish a brand new subsidiary, releasing end-point products like intelligent cellphone based on the Internet mode. The new company will officially start operations on April 1, 2015, by the moment it will be given an independent name and fresh new sub-brands. The president of Lenova Group in China Zone, Xudong Chan, will take up the post of CEO, and the business in China Zone will be taken over by Fuyao Tong.
This action of Lenovo Group is just like other cellphone manufacturers in China, being conducted in hope of establishing a new cellphone brand through Internet Marketing and its direct sales mode, and competing with other new manufacturers.
At present, Lenovo Group is the third biggest company that runs intelligent cellphone business, mainly doing sales in open market and operator market. Because variety of newly-established cellphone brands have gained many users through the Internet marketing and sales, Lenovo recently also released several cellphone products particularly selling online.
The establishment of the new company surely means Lenovo intends to increase its online business percentage, before which the CEO of Lenovo Group used to expressed the Group still had many things to learn from small companies, for example, marketing mode and upgrade method of software development, and he also pointed out in the Internet times, there shall be someone doing manufacture, and someone doing production.
"Mobile Internet, e-commerce and interactive marketing are rapidly developing, greatly changing the traditional business way. We have to change ourselves soon and seize the new opportunities. We would let users participate in the product design, communicate with them with their familiar languages and ways by fully using social medias, encourage users to take part in through the Internet thoughts, promoting our products by new means." He expressed in a statement.
Twitter teamed up French banks to enter the field of mobile payments
In October 13, France's second largest bank BPCE Group recently teamed up social networking site Twitter to enter the field of mobile payments, allowing its users to achieve transfer service via Twitter. And Twitter itself also tried to intervene in online payments, seeking new sources of revenue in addition to advertising.
Twitter is trying to catch up with Apple and Facebook, hoping occupy a place in the new payment services via smart phone or mobile applications. BPCE Group’s collaboration with Twitter will be compete with banking and credit card issuers who ruled the payment field for decades.
Back in September, BPCE Group had expressed its readiness to provide simple person to person money transfer services via Twitter for French consumers. And regardless of which bank customers use this service will not require the sender to know the recipient's bank details.
BPCE Group bank mobile payment sector S-Money CEO Nicolas Chatillon said: "S-Money offers a new way for the French Twitter users to transfer to each other, no matter which bank user they are,they needn’t expose the recipient bank information, only need a simple tweet conduction. "In addition, S-Money also allows users to transfer via SMS, manage the bank account based on the credit card industry data security standards.
BPCE Group and Twitter decided to launch a correspondent conference tomorrow in Paris for this new services, yet refused to disclose further details. During September, Twitter launched its new service "Twitter Buy", Twitter users can search and purchase products on its website. Currently, dozens of brands have begun to try the "Twitter Buy" service, including Burberry, Home Depot, Pharrell and Megadeth, etc.
Whether Twitter can be as successful as Facebook to develop more services on its platform, will be the key to its future profitability improvement.
How to delete “undeletable” files
Problem1: Conventional method to delete stubborn files.
Method 1.Restarting Windows operating system, and then delete the files in a conventional manner. Method 2.Using command like Del, Deltree to delete in DOS (or Command Prompt) interface. Method 3.Using third-party tools like non-Windows Explorer to delete, for example, ACDSee, FlashFXP, Nero and other software with folder browsing functionality. Method 4．If you install two or more operating systems, then you can delete the other operating system files in the current system. Method 5． Press the F8 key at startup to enter Safe Mode to select the delete operation. Method 6．Just directly use an advanced software to automaticaly detect and uninstall the files you don't want.
Problem1:Remove the "other program is using" document. Problem performance: In Windows XP system,you’re ready to remove a large volume of AVI format file, but the system always prompts delete operation can not be performed, there are other programs in use, even when just getting into the Windows system.
Problem Solving: Method 1: Open Notepad, click on the menu bar "File" → "Save As", rename the file as that file name you want to delete (including extension), and then replace it, you will find the capacity becomes 0 KB. In this case, perform the delete operation.
Method 2: Create a new folder in the same directory in the AVI file, and then restart. Now, do not choose that AVI file, first select the new folder you just created, and then press the Ctrl key + the AVI file, perform the delete operation.
Method 3: Change the AVI file extension to any other invalid file type, and then perform the delete operation.
Malware Protection with Configuration Manager Q: How do I use System Center Configuration Manager to deploy malware protection?
A: System Center Endpoint Protection is a native capability in System Center 2012. It's quite easy to deploy by simply enabling protection in the agent and then configuring policies that should apply to the various collections of machines.
Open the Administration workspace. Navigate to Overview, Client Settings. Either create a new settings object (device) or edit an existing one; the required settings group is Endpoint Protection. Select the Endpoint Protection group. Change the Manage Endpoint Protection client on client computers option to Yes and configure other options, as the following figure shows. Click OK.
(Photo & article by John Savill @ WindowsITPro)
If you created a new settings object, select the Deploy action and deploy to a certain collection containing machines that should have endpoint protection enabled. Create a new anti-malware policy. Open the Assets and Compliance workspace. Select Endpoint Protection, Antimalware Policies from the navigation pane. Select the Create Antimalware Policy action to create a new policy. Alternatively, you can select the Import action and use one of the built-in templates
(C:\Program Files (x86)\Microsoft Configuration Manager\AdminConsole\XmlStorage\EPTemplates -- BTW, For newbies, please be careful when making changes to Windows Registry Editor. Hit here for additional help.), which contain configurations for many types of environment such as file server, Hyper-V server, desktop, and so on. Select a template that matches and click Open.
Modify settings from the imported template, select a new name in the General tab, and click OK. Select the Deploy action for the new policy and select the same collection(s) that were enabled for endpoint protection. Note: you'll probably want different anti-malware policies
for your different types of machines because the requirements and exceptions will be different.
The next time the Configuration Manager client checks for policies, it will enable the anti-malware agent and use the policy you defined.
PS: In some cases, adware, downware are free tickets to such annoying PC threats, thus, do scan every download before you run it. Here, I'd recommend VirusTotal and Avast to you, as your first two lines of basic defense! Learn more PUP samples here.
Intel Edison comprehensive listing, specifically designed for small wearable device
In IDF this year, Intel CEO Brian Krzanich Edison announced a comprehensive listing of Edison. Edison is a general-purpose computing platform which has been developed to support wireless capabilities, specifically design for those small or wearable device inventor, entrepreneur and consumer product designers. It’s volume is only slightly larger than a postage stamp.
Edison is a complete, general-purpose wireless-enabled computing platform, there are already many reports about it before. Finally, in this year's Intel Developer Forum (IDF), it will be sold to individuals through commercial channels.
Edison module uses Intel 22nm Intel ® Atom SoC (codenamed Silvermont), including a dual-core, dual-thread 500 MHz CPU and a 32 bits 100 MHz Quark MCU. It can supports up to 40 GPIO, 1G LPDDR3 memory, 4G eMMC, dual-band Wi-Fi and Bluetooth low energy on a module about the size of a postage stamp.
In the current stage, Edison has supported the use of Arduino and C / C ++ development, and will soon be extended to Node.JS, Python, Visual Programming and RTOS. It also includes equipment and connection between the frame from the device to the cloud in order to achieve cross-device communications and multi-tenant cloud-based time series analysis services.
In the IDF, Intel's vice president of new equipment Division Mike Bell announced that Intel will launch the first software development kit (SDK) and application programming interface (API) for the wearable devices in the fourth quarter of 2014, allowing developers to develop fitness and health applications for iOS and Android. And beside described Intel Edison products, which reduce the size of the microprocessor, greatly reduce power consumption, he also highlighted how Intel Edison products will help develop the next wave of computing devices, as well as the help, software, cloud, support and ecosystems come for the developers.
As for the price, the suggested retail price of Intel Edison module is $ 50, while the suggested retail price of Arduino-oriented Intel Edison is $ 85.
The first 64 bits Android phones is coming: HTC release Desire 510
After Apple announced the first 64 bits smart phone-iPhone 5S, the first 64 bits Android phones have come on earth --HTC Desire 510, the phone uses a 64bits A53 architecture and TSMC 28nm LP process, clocked for 1.2GHz-1.4GHz, single-channel memory support 64-bit LPDDR2 / 3.
The phone main parameters are as follows: 1. 4.7 inches touch screen, the resolution supported is FWVGA level (854 × 540 pixels), the pixel density is 208ppi; 2. Body thickness was 9.9mm, weight 158 g; 3. 2100 mA battery; 4. Loaded with a VGA front camera and 5 million primary mirror camera; 5. 1.2GHz frequency 400 quad-core processor, architecture is Cortex-A53; 6. 1GB RAM memory and is equipped with 8GB memory fuselage (support microSD card of 128GB storage expansion); 7. Running Android 4.4 operating system and HTC Sense UI; 8. BlinkFeed function; 9. Supports LTE Cat.4 150Mbps, DC-HSPA + and other old standard; 10. Supports Wi-Fi, Bluetooth, NFC, GPS, GLONASS, Compass.
With the coming of 4G era, the consumers demanding of device computing power when using mobile phones to watch video, play games and other functions have become increasingly, and this demand is still growing. From the overall perspective of application ecology evolution, 64 processor supports more memory to read and write, supports greater addressing capability and can support memory more than 4GB, 64 bits specifications is no doubt to becoming a general direction of the mobile future development.
From the user side, the mobile device is changing from consumer devices to the production-level equipment. The current smart phones taking more "production" function, shooting pictures and videos more clear, having games with more experiencing, a stronger processor performance will brings more functionality and experience to the mobile terminal.
For the development of 64 bits mobile operating system, one of the most critical point is the evolution of ecosystems. No matter Apple, Google or Microsoft, they both need to keep the consistency and synergies of their different terminals which in internal ecosystem in a more computing power, and gradually promote the reunification process ecosystem.
Google Map is going out of Earth: Exploring Mars and the Moon
Google Maps are opening up new fields that can be used to explore Mars and the moon, and it also can be used to explore the two dimensions of time and space. Want to explore Mars? No problem, just needing a few hundred billion dollars, as well as hiring hundreds of talents to design spaceship or something, of course, when you finally arrive, the radiation problem should be also taken into account. So, it seems that we still have to wait it we want to go to Mars! However, now this dream will be able to achieve with Google Maps. After the in two-years anniversary of Curiosity launching on Mars, Google added 3D version of Mars and the Moon map in its mapping service, so that, it’s much easier for us to roaming in the Milky Way, but the premise is that you have to know where to point.
So here let’s check the procedure: First, go to Google Maps website; Second, there is a "Google Earth" icon in the lower left corner, click it; Third, after loading the 3D map, sliding wheel to shrink the scale, keep shrinking; Four, wait til the map can not be zoomed, then wait a minute, the"Moon" and "Mars" option will appear in the bottom of the screen; Five, if it’s not there, then the cause may be you turn off the "Explore" tab. This is the time to click on the arrow in the lower right corner to start exploring the panel.
It should be noted that only the latest version of Google Maps can use this feature, users of the classic version have to switch back to the new version.
MediaWiki has been successfully installed.
Consult the User's Guide for information on using the wiki software.
How to run a program with admin rights under a normal user
I work in a school and over the summer break I had to install a few interactive whiteboards with projectors. In one of the rooms the teacher couldn't decide where she wanted her desk situated and it seemed likely to move. To prevent having to move VGA outlets and cabling I purchased a Sony networked projector.
It arrived with a piece of software called Network Presentation Manager which once started sits in the taskbar. The idea is great as it means she can also install the software on her laptop an present from anywhere.
The downside that I didn't realise before purchasing the projector is that the Network Presentation application needs to run with admin rights. As a sensible IT admin no one has admin rights, even my daily account hasn't.
Ideally I don't want to give the end user admin rights or details to an admin account, is there any way I can arrange for the program to have admin access and not need to prompt for credentials when it starts?
- 1: maybe give batch a try --> keyword is runas
convert *.bat afterwards in *.exe, so she can't see the clear typed pw
- 2: There is a trick to launch the application using the task scheduler to run that single application with admin rights. We had to use that trick/hack with the openvpn gui. Let me see if I can find it...
[Edit] Here is the how to for openvpn, you can easily traslate it for any application you need to run like this. vpnuk.info/scheduled-task.html [/Edit]
[Edit 2] The instructions are below the ad at the top of the page. It threw me off for a second but the clear instructions are below the full screen ad [/Edit 2]
Plus Note: Sometimes, your administrator rights can prevent a PUP from running, thus use the above tips at your own risks.
Optimize PC Performance - Easy Tips to Make Your System Run Like New Again
Still worried about how to make your laptop run faster? After using the computer for several months, some users will find that: when the computer is new, it runs fast, but now the computer runs slower and slower.
Nothing can be more frustrating than a slow running laptop, especially for those whose work depends on them. But it is inevitable for the computer to run slowly as time goes. In this situation, you should tune up your computer as quickly as you can; otherwise, some other serious issues will come on the neck of another.
If there is not enough virtual memory, you computer will run incorrectly or even display various weird error message such as:
"Your system is low on virtual memory. To ensure that Windows runs properly, increase the size of your virtual memory paging file."
To solve the slow running problem, you have to make sure the computer is virus clean. As a matter of fact, virus infection is one main cause of the computer error. They are not going to run with your permission, but also eat up a large amount of system resources.
Secondly, you should uninstall all unwanted programs correctly. The more programs on the computer, the slower the computer will be; besides, the more unwanted programs exists on the PC, the more chances for you to get some error message like "Your system is low on virtual memory". So to make computer always run properly all the time, it is best that you can uninstall some unneeded programs from your computer. In addition, this also helps to free up more available disk space to make computer run faster.
Moreover, you should fix Windows registry errors so as to get your PC optimized. The registry database is a central storage for all important files and settings on your PC. As consequence, to make your computer always run pleasantly without problems, it is better that you can fix Windows registry at least twice a week either manually or automatically with a registry cleaning product.
Max Uninstaller Review - Don't Buy Max Uninstall Before Reading This Review
Max Uninstaller is an application that helps users uninstall unwanted programs at one go. This software was designed so that users can easily remove unused programs without having to go through a lot of hassles.
Max Uninstaller will never let your PC get overwhelmed with unused programs and their leftover traces. It keeps your PC clean by doing a smart and effective search of leftover items thought out your File System and Windows Registry.
With Max Uninstaller application, you can easily and completely get rid of the program traces that you do not need more. Max Uninstaller is a tool that is designed for the purpose of uninstalling programs, and it does its job efficiently.
The installation process of this software is a basic one, which can be completed in a few seconds. Look for a pure uninstaller that does not need an huge hard drive and will not screw your system again? Max Uninstaller is the answer.
A lot of programs you install like to embed themselves in your start up menu which eventually slows down the time it takes your computer to start up and shut down. With Max Uninstaller you can remove programs from your start up menu with just one click. Removing just a few programs can result in dramatically faster start up and shut down times.
Standard and advanced uninstall
With its advanced and fast algorithms, Max Uninstaller analyzes an application's data before uninstall and scans for remnants after the uninstall of a program. After the program's regular uninstaller runs, you can remove additional unnecessary files, folders, registry keys and values that are usually left over on your computer. Using the uninstall command you can automate the uninstall process and uninstall few programs in a short time.
Easy to use
Max Uninstaller is pretty easy to use. Once downloaded, follow the on screen installation prompts to properly install and launch the uninstaller. The users' interface is intuitively laid out with tabs clearly arranged at the top. Clicking on the uninstaller tab lets you see a complete list of all programs and applications currently installed on your computer.
From a list of provided programs found on your computer, all you have to do is target the program you want to remove and click “Run Analysis.” Max Uninstaller then carefully searches your computer for all files, folders, and registry entries related to the program that you’ve told it to investigate. You’re then able to press “Complete Uninstall” to start the removal process.
Max Uninstaller also includes a tool to help you clean out registry entries and unused drivers. This helps to improve overall performance of your computer. While having useless drivers on your system isn’t nearly as much of a problem as registry errors, keeping your system neat and tidy inside and out does occasionally pay off.
The reason to choose Max Uninstaller
Why should you use a separate uninstaller program to remove programs? There are more leftover after you uninstall an unwanted program and then the leftover can affect installation of other programs that you will install in future. Wise Uninstaller not only provides you with safe removal, but also allows program to repair the installation.
Some programs you cannot find options to uninstall, so those programs should be forced uninstall using a third party software like Max Uninstaller. It supports Win 8 and its completely free of charge. It has been combined standard uninstall and forced uninstall together.
Max Uninstaller assists you in installing applications on your computer more efficiently. The application has a friendly user interface, which will make it easy to analyze and keep track of installed applications. From Max Uninstaller you can not only uninstall applications, but also get more information about the installed applications in an organized way.
Max Uninstaller works the way you think, making it easier than ever to uninstall programs quickly, efficient and completely. Moreover, it also can remove the residual entries which may drive you mad. With advanced system scanning algorithm, Max Uninstaller can easily remove any program installed on your computer - completely, no trace left.
All in all, Max Uninstaller is a very good piece of software. It works as it’s supposed to do, most of the time, and when it doesn’t, it still includes the tools needed to get the job done. In this way, Max Uninstaller does get the job done. It’s faster than the basic Windows uninstaller, it’s more proficient at removing corrupt directories and files that most of its competition, and it isn’t terribly difficult to use.
Remain Updated And Secure Your PC from Viruses
Antivirus systems are there to keep you secure and make sure that your information and data remain protected from computer viruses and other malicious programs. However, we all think that once we have installed an antivirus system, our duty is over and rest is the job of the antivirus program. You may be wrong here. While antivirus software is designed to stop malicious activity, you should be aware of the fact that many viruses and other malware can hamper proper functioning of antivirus system too. If a virus infects the antivirus software installed on your computer system, then your PC is as vulnerable as can be. In such a case, the virus may not let antivirus perform its duty, may always intercept scans, may return uninfected files on request or may just leave the scanner idle and doing nothing.
Online Scanning: One of the best ways to keep a check on what is happening on your computer system is to run online scan. Online scanners offer a good medium to know if your antivirus system is working fine or not. All you need to do is get access to a genuine online scanner, probably offered by a known and trusted antivirus company. It might ask you to download a temporary file on your computer (mostly engine). Once you do it and click on run, you are good to go.
Regularly Updating the Antivirus: Make sure you are able to schedule a regular update while configuring your antivirus software. In case you cannot understand how to do it, you can always check for solution online or see if you have a facility of support. If not, you can always update the antivirus manually. All it takes is a few clicks and few seconds for the update to begin. You will need internet connection for that.
If an antivirus is infected, you may find it difficult to update or run scanner of your antivirus. Furthermore, it might not return any report or act differently when any command is given. If such a thing happens, it is advised that you remove the antivirus software completely and then install a fresh copy. Or, you can switch to a new antivirus system. Depending on what seems easy and better to you, you can do that. The bottom line is ensuring security from computer viruses.
Updating other programs, software and operating system regularly: Finally, not just antivirus, but you should keep other programs and applications updated too. This includes your operating system. You should check for regular updates at genuine websites and if your operating system is authentic, you will get constant updates. Keep your computer in best condition and do not install any malicious program. If you have to download a third party program or software, then first check its review and then find a reputed and genuine source for downloading it.
Following such methods will make sure that you are not an easy target of computer viruses. It will keep basic viruses and malware at bay.
VilmaTech online support shares virus removal instructions with Windows users every day. A vast account of PC users have learn solutions from this blog: blog.vilmatech.com
Learn How to Delete Duplicate Files Easily - DuplicateCure Review
Duplicate files can enter your system in various ways. Too many copied files on your PC can clutter up a user’s computer thus will have leading it to run slower. It becomes more and more difficult to find the information we need. If your slow computer is caused by duplicate files. It can be seen plenty of times, on Macs and PCs, and the effects of cleaning or moving duplicate files and folders are noticeably amazing. You can speed your computer by 100% or more by getting rid of the junk filesthat you don't need.
How to delete duplicate files?
If you wish to attempt and delete duplicates manually, then follow these options with caution;
1. Click on the 'Start' menu and choose 'Search'
2. Type in the file you wish to search for and press enter. The scan will start automatically. Please note that you are scanning the whole computer now. If you want to scan other locations, you need to browse to the location first. And then start the scan.
3. Wait for the scan results for duplicates.
4. After the scan completes, a list of detected files that contain the same file name will be shown in the window. Right click and select "View" and then click "Details". Now you can see all the information of the files such as file size, modified date, type and so on. Now you need to compare them carefully. Delete the duplicates, leaving the original file.5. Repeat the whole process for every single file
This manual duplicate files removal can be a boring, timely task. There is an easier way to find and delete duplicate files using a duplicate file cleaning tool. This very powerful tool can search files through names, file size, file type, modified date, as well as more advances selectors like duration if you're dealing with mp3s, author, and many others. All things considered, I'm going to recommend DuplicateCure. It scans folders for identical files so quickly then you can delete or move them off your PC's hard drive to free up space. It also includes some advanced duplicate detection options, like MP3 tag and JPEG EXIF comparison.
Tips To Uninstall Rising Antivirus
Truly, Rising Antivirus is a security program that integrates itself into almost every aspect of your computer operation. This program contains a large suite of applications designed to protect your computer from outside attacks and from computer error. Some users find it overly constrictive and they have received the errors when trying to uninstall Rising Antivirus.
This error occurs when The Rising Antivirus has not been disabled prior to beginning the removal or repair process:
The software on your computer has already been installed on your comp. To continue with installation you must restart your computer (The setup program will setup automatically). To restart now click Yes. To restart later and cancel the installation for now, click No.
After rebooting the installer runs and this message keeps coming up again and again in the middle of the installation. Things that have been done to try to solve the problem, uninstalling all files of trend antivirus and its components and reinstalling it. But the same problem keeps coming up.
The first thing you want to try is to locate Rising Antivirus in the Add/Remove Control Panel and try to remove it from there
Sometimes, these default methods of uninstalling Rising Antivirus application may not work properly and thus user cannot or unable to remove and uninstall it. In this situation, you may need to remove Rising Antivirus from your computer as such steps.
1. Open the Control Panel on your computer by select the “Start” menu followed by the “Control Panel” menu option. Then, select the “Add/Remove Programs” (or Uninstall a Program) menu choice and click the Norton Internet Security on the list of applications on the subsequent menu.
2. Select the “Change/Remove” menu option and acknowledge the warning menus that appear on your computer.
3. Restart your computer after Rising Antivirus has been removed.
4. Verify the Rising Antivirus icons have been removed from your computer’s desktop and “Program Files” menu located under your computer’s “Start” menu.
If you not confident to go through this process yourself or if this didn’t get rid of the Rising Antivirus then you might need to download removal software to uninstall everything for you. Special Uninstaller that has earned a worldwide acknowledges can be downloaded online.
How to Remove FBI Cybercrime Division Virus With YooCare Instruction?
FBI Cybercrime Division Virus is categorized ransomware which designed by the cybercriminals to steal PC users' money. All of the victims would receive a warning message appearing on the PC screen showing that the PC user has violated the local laws and the computer was used illegally. If you want to unblock the computer, you have to pay them a fine from $100 - $500 within the allotted time of 72 hours by use of Moneypak cards. However, before you send the money to them, you had better think about this whole thing very carefully.You should realize that none of authorities around the world are using such messages (which locks computer's screen) to collect fines for any law violations. Even if the computer user did violate the law, the FBI will not block access to computer systems and demand a fine be paid in order to unlock the computer system. The FBI will appear at your home if you have violated similar laws. This virus can pass your firewall to infect your system. Once being infected, this virus can forbid your anti-virus program completely. And it may mess up your system data and steal your personal information. Don’t just let this virus stay in your computer, it can bring more threatens to your computer. What you should do is to remove it completely.
The FBI Cybercrime Division Virus will display fake notification like this:
"ATTENTION! Your PC is blocked due at least one of the reasons specified below. You have been violating Copyright and Related Rights Law. (Video, Music, Software) and illegally using or distributing copyrighted content, thus infringing Article 1, Section 2, Clause 8, also known as the Copyright of the Criminal Code of United States of America. Article 1, Section 2, Clause 8 of the Criminal Code provides for a fine of 200 to 500 minimal wages or a deprivation of liberty for 2 to 8 years. You have been viewing or distributing prohibited Pornographic content (Child Porn/Zoophilia and etc). Thus violating Article 2, Section 1, Clause 2 of the Criminal Code of United States of America. Article 2, Section I, Clause 2 of the Criminal Code provides for a deprivation of liberty for 4 to 12 years. Illegal access to computer data has been initiated from your PC, or you have been... Article 2, Section 1, Clause 8 of the Criminal Code provides for a fine of up to 5200,000 and/or a deprivation of liberty for 4 to 9 years. Illegal access has been initiated from your PC without your knowledge or consent, your PC may be infected by malware, thus you are violating the law On Neglectful Use of Personal Computer. Article 2, Section 1, Clause 1 of the Criminal Code provides for a fine of up to 5200,000 and/or deprivation of liberty for 4 to 9 years. Spam distribution or other unlawful advertising has been effected from your PC as a profit-seeking activity or without your knowledge, your PC may be infected by malware. Article 2, Section 1, Clause 2 of the Criminal Code provides for a fine of up to 5500,000 and a deprivation of liberty of up to 6 years. In case this activity has been effected without your knowledge, you fall under the above mentioned Article 2, Section 1, Clause 1 of the Criminal Code of United States of America. Your personality and address are currently being identified, a criminal case is going to be initiated against you under one or more articles specified above within the next 72 hours. Pursuant to the amendment to the Criminal Code of United States of America of February 05, 2013, this law infringement (if it is not repeated - first time) may be considered as conditional in case you pay the fine to the State. Fines may only be paid within 72 hours after the infringement. As soon as 72 hours elapse, the possibility to pay the fine expires, and a criminal case is initiated against you automatically within the next 72 hours! To unblock the computer you must pay the fine through MoneyPak of $300. When you pay the fine, your PC will get unlocked in 1 to 72 hours after the money is put into the State's account. Since your PC is unlocked, you will be given 7 days to correct all violations. In case all violations are not corrected after 7 working days, your PC will be blocked again, and a criminal case will be initiated against you automatically under one or more articles specified above."
If you installed antivirus software on your computer previously, you would find that most of the PC security programs are unable to clean up the FBI Cybercrime Division Virus completely even you have updated the applications to the latest version. But with some useful tips introduced by YooCare Online Support Team, you can remove the virus completely yourself even though you have little knowledge about the computer. Here, let's see how the YooCare experts remove this PC malware.
We Quote the Instructions from http://blog.yoocare.com/remove-fbi-cybercrime-division-virus-scam-step-by-step/
1. Reboot your infected computer and keep pressing F8 key on your keyboard and next use the arrow keys to select “Safe Mode with Networking” and press E/Enter;
2. Press Ctrl+Alt+Del at the same time or right click on the Task Bar to open the Windows Task Manager; then scroll down to End processes related to [FBI Cybercrime Division].exe;
3. Open Control Panel from Start menu; then find Folder Options and under View tab, tick Show hidden files and folders and non-tick Hide protected operating system files (Recommended) then click OK;
4. Open Registry Editor by pressing Windows+R keys and typing in regedit;
5. Find out and delete all these associating files as below:
6. Find out and remove all these associating registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ” ”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegedit” = 0
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegistryTools” = 0
7. Reboot again and get into normal mode when the above steps are done.
Trusted Locations in Office application
Another aspect of trust in Office 2010 application is the feature known as Trusted Locations. This feature is available in Word, Excel, PowerPoint, Access, Visio, and Microsoft InfoPath. Users can specify trusted locations on a per-application basis from within the Trust Center, whereas administrators can use Group Plolicy do this and also specify trusted locations on a global basis for all supported Office applications.
A trust location is basically a folder designated in such a way that any documents it contains are trusted. In other words, if you use Word to open a document stored in a trusted locations, the document is opened for editing and all active content in it is enabled. Clearly, trusted location are powerful and shouldn’t be abused. You must make sure that only appropriate content (content you believe is trustworthy) is stored in such locations.
Trust location can be either folders on your hard drive or shared folders on the network. By default, shared folders on the network cannot be trusted unless the user select the Allow Trusted Location On My Network (Not Recommended) checkbox. Also by default, only certain folders users by word are configured as trusted locations, specifically the default, only certain folders used by Word are configured as trusted locations, specifically the default startup location for Word and some folders where templates are stored. Let’s say that you decide to add a new trusted location, namely your Documents folder and any subfolders of this folder. Take this step so that any documents have been saved in the Document folder or its subfolders will open for editing automatically, with all active content enabled. To do this, click Add New Location in the Trusted Location panel of the trusted center shown above. Doing this opens a dialog box that lets you specify the folder in the trust decision, as shown on the next page.
As with all security options in Office programs, users may be blocked from changing these settings if the administration of the network has used Group Policy to enforce a desired configuration of settings.
Settings for Configuring the Behavior of Trusted Documents in Word
Allow Documents On A Network To Be Trusted
Trusted decisions will be remembered for documents stored on network shares. This setting is enabled by default unless overridden by policy. If the administrator has configured access control permissions properly for the shared folder, and if you trust the other users who have access to this share, you could consider leaving this setting enabled if policy doesn’t prevent you from doing so. If you disable this setting, the yellow message bar will be displayed whenever the user attempts to open a document stored in the shared folder.
Disable Trusted Documents
Trust decisions will not be remembered. The result is that the yellow message bar is displayed each time the user attempts to open the document. This setting is disabled by default unless overridden by policy.
If you are concerned about the possibility of unanticipated active content being present in documents you work with, you could consider enabling this setting. Doing this will cause the yellow message bar to be displayed each time the user attempts to open any document. However, this approach tends to be ineffective from a security standpoint because eventually users get accustomed to just clicking Enable Editing whenever they see a yellow message bar, without even bothering to read the message bar.
Clear All Trusted Documents So They Are No Longer Trusted
Clicking this button clears all trust decisions the user previously made from the registry.
You could consider doing this when you are finished with a big project and ready to start another. The reason is that only a limited number of trust decisions can be remembered, so clearing the list of Trust Documents make room for new trust decisions to be remembered.
Security and Privacy Should be Concern of Everyone
Security and privacy should be concern of everyone in an organization, not just IT of management.
The role of IT in an organization’s security and privacy is to design and implement technical controls that help safeguard the organization’s network, systems, and data.
The role of management in an organization’s security and privacy is to publish and clearly communicate the written security policies that explain what users should and should not do to help safeguard the organization’s network, systems, and data.
The role of the office worker in an organization’s security and privacy is to comply with the company’s security policies, avoid circumventing the controls that IT has put in place, and use appropriate channels to communicate their requests for changes to any policies and controls that they think are keeping them from performing their jobs effectively. Everything is connected in today’s corporate environment, and if we all try to help each other do our jobs, then our own work will get done faster and with a lot less hassle.
Do Not Do Anything That Might Contribute Negatively to the Security of Your Company
What could you, the exasperated office worker, do that might contribute negatively to the security of your company’s business systems and privacy of their sensitive business data? Here are a few things you should avoid doing if at all possible.
But what if your organization isn’t like this? What if it’s horrible to work there and the place is full of seemingly pointy-headed managers and cynical, know-it-all IT personnel? What can you do then?
Well, remember that if all else fails, you can always vote with your feet. Why Dillbert has kept putting up with his pointy-haired manager over the years is something that’s quite beyond me. If he were half the smart guy that he seems to be in the cartoon (see dillbert.com), Dillbert would quit his job and find a better company to work at, or even start his own business!
What is My Role in The Security and Privacy of an Organization’s Computer Systems
Individuals who work in an office as you do probably tend to think that your work situation can be summed up with something like a pyramid.
What you should keep in mind, however, is the close interconnectedness in the way that a company actually works. As the illustration here suggests, the security and privacy of an organization’s computer systems and the information that store and manage are the responsibility of everyone involved: the management team, the IT department, and you, the user.
Regardless of how you may think from time to time when the going gets tough at the office, the fact is that you’re an essential cog in the gear chain that drives your organization’s business forward and keeps its profitability on track. And this is especially true in the areas of information security and privacy, where your actions may contribute either positively or negatively in leading the business towards success or failure.
Wireless Syncing Project
When you begin living with your iPad, you soon discover that it’s really convenient to put a lot of the personal information that you keep on your desktop or laptop computer on your iPad as well. The preceding information Syncing Project shows how to bring all that stuff into alignment every time you connect your iPad to your computer.
But using that method of syncing your information means that you have to connect your iPad to your computer every so often to keep each device up to date, and for best results, you need do this regularly and frequently. It’s just like brushing your teeth.
We live, however, in an age of miracles and wonder – and of wireless technology. There’s no reason why your iPad and your computer can’t share their information over the air so you can avoid the daily chore of getting them all synced up.(You should still brush your teeth, of course. )
No matter whether you have a Wi-Fi or 3G iPad, you can make use of cloud service to sync your information between your computer and your iPad. This project describes how to use a cloud service offered by Apple: MobileMe. In this project, you sync your contact, calendars, and bookmarks with MobileMe from both your computer and your iPad.
The Security and Privacy of Your Company’s Information System and Resources
Office staff are strictly prohibited from attempting to circumvent any of the security of privacy controls that IT has put in place on the company network and its resources. In other words, not only have you compromised your company’s security, but you’ve also violated their security policies. If you get caught doing this, you may well face consequences!
So saying that security and privacy are solely the responsibility of IT management and that as an office worker, you have absolutely no responsibility in these matters. It is simply not true. What is true is that the parties primarily responsible for ensuring the security and privacy of business computing resources and data are upper management, which defines and publicizes the policies that all users (including IT) should follow, and the IT department, which implements controls that enforce those security privacy policies that can be enforced solely by technical means.
Here’s an analogy that might make this clearer. Saying that network and data security is solely the responsibility of your IT department is like saying that the maintenance of your car is solely the responsibility of your mechanic. But if you’re driving along the highway and your oil light is flashing and you ignore it, you’re going to have a problem – and it’s clearly not your mechanic’s fault (unless he forgot to put in the oil when you last had your car serviced).
Likewise, saying that confidentiality of business information is solely the responsibility of management is like saying that you can safely ignore the road signs and traffic lights when you driver your car. If you have an accident as a result of doing something like that, good luck trying to blame anyone other than yourself!
So yes, you, the lowly office worker, should – and must – care about the security and privacy of your company’s information system and resources. You do have a role in protecting your company against the theft , destination, corruption, or accidental loss of sensitive business files and data.
Learn About the Responsibilities of Management and Safeguarding the Information Systems
If you work in an office and use Office software, then you’ve probably thought (and possibly expressed) those kinds of ideas from time to time. But is such a position really justified? Is security only the responsibility of the IT department? And is protecting the privacy of confidential business information only the responsibility of upper management?
To a certain extent, your thinking is correct. Ensuring the security of an organization’s network, computers, and other connected device such as smartphones is, in fact, one of the key roles of IT. The IT department also is primarily responsible for ensuring that files and other data stored on the network and accessible to you via your computer or smartphone are safe to work with and protected against unauthorized access. So you should be able to open and work with document, spreadsheets, and other files without worrying whether they contain viruses or other malware. You should be able to just do your job, provided that IT is doing its job properly, right?
But what if you think the controls that IT has put in place on your network are too restrictive? What if you want to circumvent these controls so you can “just do your job”? For example, suppose that your IT department has locked down Office so that macros can’t run in documents. You think, however, that macros can be useful to “help you do your job better under certain circumstances,” so you try to work around the controls IT has put in place by bringing your own personal laptop so you can add macros to them.
Consider Security And Privacy as They Perform Their Jobs
What’s the big deal? Isn’t security the responsibility of the guys in the IT department down on the third floor? If it doesn’t, those IT guys should be fired-it’s not my fault if a Word document I open has a virus in it.
And who reads those policy documents anyway? They’re so long and wordy and hard to follow. I’m sure nobody will be harmed if I accidentally leave some hidden comments in a document I publish on our company’s website.
I just need to do my job and wish IT would do theirs, and those guys in management should just stay out of my way.