Jump to content
IObit Forum
Top Free Driver Updater Tools Best 25 PC Optimization Software Best 22 Antimalware Best 22 Uninstaller Software IObit Coupons & Discount Offers PC Optimizer


  • Posts

  • Joined

About martino

  • Birthday 04/08/1962


  • Biography


  • Interests


  • Occupation
    Chief Executive Officer by IObit


  • -OS -Security_Software -IObit_Software +Computer_Details
    Vista Business

    ASC Pro
    IMF Pro
    IPF Pro

    Smart Defrag
    Game Booster
    Random Password Generator


  • Native Language
    english and german

martino's Achievements


Newbie (1/14)



  1. my last post here in the IObit forum :(( (is unfortunately not my level here) 28 Types of Computer Security Threats and Risks There are many types of computer security threats in this world. Some are pretty harmful while some are totally harmless although annoying. There are also some which does not do any damage to your computer, but has the capability to empty the numbers in your bank account. If you are really interested to find out these threats, I have 28 of them here and do get yourself a cup of coffee before you start. The types of computer security threats 1. Trojan. Trojan is one of the most complicated threats among all. Most of the popular banking threats come from the Trojan family such as Zeus and SpyEye. It has the ability to hide itself from antivirus detection and steal important banking data to compromise your bank account. If the Trojan is really powerful, it can take over your entire security system as well. As a result, a Trojan can cause many types of damage starting from your own computer to your online account. 2. Virus. Looking at the technology 10 years back, Virus is something really popular. It is a malicious program where it replicates itself and aim to only destroy a computer. The ultimate goal of a virus is to ensure that the victim’s computer will never be able to operate properly or even at all. It is not so popular today because Malware today is designed to earn money over destruction. As a result, Virus is only available for people who want to use it for some sort of revenge purpose. 3. Worms. One of the most harmless threats where it is program designed only to spread. It does not alter your system to cause you to have a nightmare with your computer, but it can spread from one computer to another computer within a network or even the internet. The computer security risk here is, it will use up your computer hard disk space due to the replication and took up most of your bandwidth due to the spread. 4. Spyware. Is a Malware which is designed to spy on the victim’s computer. If you are infected with it, probably your daily activity or certain activity will be spied by the spyware and it will find itself a way to contact the host of this malware. Mostly, the use of this spyware is to know what your daily activity is so that the attacker can make use of your information. Such as if you browse on sex toys for a week every day, the attacker will try to come out with a sex toy scam to cheat on your money. 5. Scareware. Scareware is something that plant into your system and immediately inform you that you have hundreds of infections which you don’t have. The idea here is to trick you into purchasing a bogus anti-malware where it claims to remove those threats. It is all about cheating your money but the approach is a little different here because it scares you so that you will buy. 6. Keylogger. Something that keeps a record of every keystroke you made on your keyboard. Keylogger is a very powerful threat to steal people’s login credential such as username and password. It is also usually a sub-function of a powerful Trojan. 7. Adware. Is a form of threat where your computer will start popping out a lot of advertisement. It can be from non-adult materials to adult materials because any ads will make the host some money. It is not really harmful threat but can be pretty annoying. 8. Backdoor. Backdoor is not really a Malware, but it is a form of method where once a system is vulnerable to this method, attacker will be able to bypass all the regular authentication service. It is usually installed before any virus or Trojan infection because having a backdoor installed will ease the transfer effort of those threats. 9. Wabbits. Is another a self-replicating threat but it does not work like a Virus or Worms. It does not harm your system like a Virus and it does not replicate via your LAN network like a Worms. An example of Wabbit’s attack is the fork bomb, a form of DDoS attack. 10. Exploit. Exploit is a form of software which is programmed specifically to attack certain vulnerability. For instance if your web browser is vulnerable to some out-dated vulnerable flash plugin, an exploit will work only on your web browser and plugin. The way to avoid hitting into exploit is to always patch your stuff because software patches are there to fix vulnerabilities. 11. Botnet. Botnet is something which is installed by a BotMaster to take control of all the computer bots via the Botnet infection. It mostly infects through drive-by downloads or even Trojan infection. The result of this threat is the victim’s computer, which is the bot will be used for a large scale attack like DDoS. 12. Dialer. This threat is no longer popular today but looking at the technology 10 years back or more where we still access the internet using a dial-up modem, it is quite a popular threat. What it does is it will make use of your internet modem to dial international numbers which are pretty costly. Today, this type of threat is more popular on Android because it can make use of the phone call to send SMS to premium numbers. 13. Dropper. Looking at the name, a Dropper is designed to drop into a computer and install something useful to the attacker such as Malware or Backdoor. There are two types of Dropper where one is to immediately drop and install to avoid Antivirus detection. Another type of Dropper is it will only drop a small file where this small file will auto trigger a download process to download the Malware. 14. Fake AV. Fake Antivirus threat is a very popular threat among Mac user about 10 months ago. Due to the reason that Mac user seldom faces a virus infection, scaring them with message which tells them that their computer is infected with virus is pretty useful where it results them into purchasing a bogus antivirus which does nothing. 15. Phishing. A fake website which is designed to look almost like the actual website is a form of phishing attack. The idea of this attack is to trick the user into entering their username and password into the fake login form which serves the purpose of stealing the identity of the victim. Every form sent out from the phishing site will not go to the actual server, but the attacker controlled server. 16. Cookies.Cookies is not really a Malware. It is just something used by most websites to store something into your computer. It is here because it has the ability to store things into your computer and track your activities within the site. If you really don’t like the existence of cookies, you can choose to reject using cookies for some of the sites which you do not know. 17. Bluesnarfing. Bluesnarfing is all about having an unauthorized access to a specific mobile phones, laptop, or PDA via Bluetooth connection. By having such unauthorized access, personal stuff such as photos, calender, contacts and SMS will all be revealed and probably even stolen. 18. Bluejacking. Bluejacking is also uses the Bluetooth technology but it is not as serious as Bluesnarfing. What it does is it will connect to your Bluetooth device and send some message to another Bluetooth device. It is not something damaging to your privacy or device system compared to the Bluesnarfing threat. 19. DDoS. One of the most famous thing done by Anonymous, which is to send millions of traffic to a single server to cause the system to down with certain security feature disable so that they can do their data stealing. This kind of trick which is to send a lot of traffic to a machine is known as Distributed Denial of Service, also known as DDoS. 20. Boot Sector Virus. It is a virus that places its own codes into computer DOS boot sector or also known as the Master Boot Record. It will only start if there it is injected during the boot up period where the damage is high but difficult to infect. All the victim need to do if they realize there is a boot sector virus is to remove all the bootable drive so that this particular virus will not be able to boot. 21. Browser Hijackers. A browser hijacker uses the Trojan Malware to take control of the victim’s web browsing session. It is extremely dangerous especially when the victim is trying to send some money via online banking because that is the best time for the hijacker to alter the destination of the bank account and even amount. 22. Chain Letters. When I was small, I got tricked with chain letters written by my friend. But chain letters does not stop at that era. It brings to adult life as well where people like to send chain letter such as Facebook account delete letter. It usually says if you don’t forward that particular message or email to 20 people or more, your account will be deleted and people really believe that. 23. Virus Document. Virus today can be spread through document file as well especially PDF documents. Last time, people will only advice you not to simply execute an EXE file but in today’s world with today’s technology, document file should also be avoided. It is best if you use an online virus scanner to scan first before opening any single file which you feel it is suspicious. 24. Mousetrapping. I am not too sure whether you had encountered a Mousetrapping Malware before where what it does is it will trap your web browser to a particular website only. If you try to type another website, it will automatically redirect you back. If you try clicking forward/backward of the navigation button, it will also redirect you back. If you try to close your browser and re-open it, it will set the homepage to that website and you can never get out of this threat unless you remove it. 25. Obfuscated Spam. To be really honest, obfuscated Spam is a spam mail. It is obfuscated in the way that it does not look like any spamming message so that it can trick the potential victim into clicking it. Spam mail today looks very genuine and if you are not careful, you might just fall for what they are offering. 26. Pharming. Pharming works more or less like phishing but it is a little tricky here. There are two types of pharming where one of it is DNS poisoning where your DNS is being compromised and all your traffic will be redirected to the attacker’s DNS. The other type of pharming is to edit your HOST file where even if you typed http://www.google.com on your web browser, it will still redirect you to another site. One thing similar is that both are equally dangerous. 27. Crimeware. Crimeware is a form of Malware where it takes control of your computer to commit a computer crime. Instead of the hacker himself committing the crime, it plants a Trojan or whatever the Malware is called to order you to commit a crime instead. This will make the hacker himself clean from whatever crime that he had done. 28. SQL Injection. SQL injection does not infect the end users directly. It is more towards infecting a website which is vulnerable to this attack. What it does is it will gain unauthorized access to the database and the attacker can retrieve all the valuable information stored in the database. bye bye cheers . . . martino
  2. Get Rid of Malware If you suspect there is malware is on your computer, take these steps: Stop shopping, banking, and doing other online activities that involve user names, passwords, or other sensitive information. Update your security software, and then run it to scan your computer for viruses and spyware. Delete anything it identifies as a problem. You may have to restart your computer for the changes to take effect. If your computer is covered by a warranty that offers free tech support, contact the manufacturer. Before you call, write down the model and serial number of your computer, the name of any software you've installed, and a short description of the problem. Many companies – including some affiliated with retail stores – offer tech support on the phone, online, at their store, and in your home. Decide which is most convenient for you. Telephone and online help generally are the least expensive, but you may have to do some of the work yourself. Taking your computer to a store usually is less expensive than hiring a repair person to come into your home. Once your computer is back up and running, think about how malware could have been downloaded to your machine, and what you could do differently to avoid it in the future. cheers . . . martino
  3. martino

    O F F E R S

    O F F E R S Technical Support Engineer Job at IObit Support Engineer for IObit, within the IObit Malware Fighter System Protection Solutions Division, you will be responsible for supporting our entire licensed customer base through a variety of mediums. Key Responsibilities: - Provide proactive assistance to all IObit support groups - Respond to overall escalation management and technical solutions when issues are reported to them - Reviewing open issues on a daily basis, updating our customers on the status of their escalated cases, and assisting in the reproduction of issues - Ensure that all of the required files are gathered and available prior to escalating an issue to our IObit Malware Fighter team - Establishing effective lines of communication with our IObit Malware Fighter team and management to ensure cases are flagged that require immediate attention - Log all issues into MAX, updating activities to cases, and escalate cases - Act as a focal point for product knowledge on which you are a lead - Share your knowledge and provide articles to the Knowledge Base team, and communicate new product information and known issues - Provide 24x7 severity based customer support - Perform duties as assigned by management Qualifications Required Experience/Skills & Education: - At least three years of full time experience in customer care/customer support - Advanced writing and verbal communication skills - Ability to multi-task and prioritize job requirements - Strong personal organization skills - Bachelors degree, OR equivalent applicable working experience - Strong Exchange knowledge - certification required or equivalent work experience - Strong Domino knowledge - certification required or equivalent work experience - Strong Security knowledge and/or certification desired - Strong Networking knowledge and/or certification desired - Strong Windows based OS (2000, 2003, Professional) knowledge and/or certification desired - Ability to read network logs/captures - GroupShield Exchange, GroupShield Domino and/or ePolicy Orchestrator knowledge is a bonus - Progress towards or completion of certifications with Microsoft, Novell, Lotus, Unix, Cisco and others is desired - Advanced writing and verbal communication skills Ability to multi-task and prioritize job requirements Strong personal organization skills - During your initial three month probation period you will be expected to undertake and successfully complete certification on: CompTIA Security+ (External industry certifications) - Additional certifications may be added in future as deemed necessary apply now and send us an email: martino@iobit.com cheers . . . --> IMF/ASCU Team <--
  4. IT Definition of Trojan.Ransom.Gen IT Definition of Trojan.Ransom.Gen: Harmful as Trojan.Ransom.Gen is, it is a great threat to computer users for the Trojan horse can violate the privacy and compromise the security aggressively. This Trojan horse spreads through network and comes into your computer when you visit harmful contents, open junk email or download free items from dangerous web pages unwarily. You get such a virus unwarily and will suffer great loss after it penetrating into your computer. With this Trojan infection, you will come across numerous pop ups on your screen every time performing browsing tasks. You are also redirected to dangerous web pages and surprised to find that homepage and browser settings are just changed randomly. Furthermore, the virus may record your computer resource to gather your precious information so as to perform malicious tasks on purpose. cheers martino
  5. Instructions on removing Trojan.Ransom.Gen completely: 1. Restart your PC before windows launches, tap “F8” constantly. Choose “Safe Mode with Networking” option, and then press Enter key. 2. Press Ctrl+Alt+Del keys together and stop Trojan.Ransom.Gen processes in the Windows Task Manager. 3. Delete associated files from your PC completely as follows: %AllUsersProfile%\~ %AllUsersProfile%\~r %AllUsersProfile%\.dll 4. Search for all related registry entries infected by Trojan.Ransom.Gen and wipe them out: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “.exe” HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “” HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “CertificateRevocation” = ’0′ HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnonBadCertRecving” = ’0′ 5. Reboot the computer to normal mode when the above steps are done. cheers martino
  6. IObit Malware Fighter Fun Fact 1: Did you know that the most common way that Malware installs undefined programs onto your computer is by you clicking the "Close" button on a popup in your browser? IObit Malware Fighter Solution 1: The next time you get a popup, instead of clicking "Close" on your browser, go to your task bar or task manager and kill the page like that. --> IMF / ASCU Team <-- -- IObit Europe Laboratory <--
  7. hi melvin! hi melvin! thank you for your words. your words have inspired us and superior. . .
  8. Fix Blue Screen of Death (BSOD) Just about everyone hates the ‘Blue Screen of Death’ just about as much as they hate eating their green vegetables! Having your hard drive fail, files deleted and information at risk is not something anyone is fond of — but with technology evolving daily, it’s getting extensively difficult to fix this. Today, I will tell you how to fix the ‘Blue Screen of Death.’ Let’s begin. The Blue Screen of Death occurs when Windows encounters a very critical issue. This means it cannot recover without fiddling changing things. Let’s take a look at the causes: Driver: A driver, or (Hard Drive) has a nervous system. This communicates with the device in your machine that executes commands and operations. (Boot, login feature, opening browsers,) etc. Are any of your drivers out-of-date, corrupt or completely the wrong driver, trying to act as the right driver? This sends Windows haywire. Today, it’s very tough to determine which driver is causing what error. In most cases, it’s simply easier to buy a new one rather than recover/fix it. (If you currently don’t have a Blue Screen and are trying to be safe and prepare for one in case, what you should do is install a program called IObit Advanced SystemCare V6 (Toolbox / IObit Driver Manager). What this program does, is no matter what computer, it updates ALL of the drivers to the most updated/correct version. How to fix?: Only experts with extreme knowledge on how to edit a registry can repair this blue screen issue. Most of the time we have a format system that works for us — in other words, we either re-install the same operating system or a different one. We also sometimes just format and reuse the same drive. Another cause is overpower use of RAM. Too much use of your RAM can exceed the max and tire out your computer. RAM can only process the intended amount, so please try to go to task manager and check what’s running in the background and seeing if you need these running programs — do this daily with a daily quick scan from IObit Malware Fighter. One solution is to download IObit Advanced SystemCare V6 (Toolbox / IObit Disk Doctor). This is to do a system restore. Most of the time this is the only solution other than completely getting a new hard drive. A Blue Screen of Death error is also called a STOP error. Did your computer reboot after the BSOD? If the blue screen flashed and your computer rebooted automatically before you had time to read anything, see Tip # BSOD at the bottom of the page. Data Corruption is the main thing the Blue Screen of Death is known for. That’s why most people just get a new hard drive. Did you just install a new program or a piece of hardware, update a driver, install an update? If so, there’s a very good chance that the change you made had caused the BSOD error. Undo the change you made and test again for the STOP Error. Depending on what change you made, some solutions might include: Startup using Last Known Good Configuration to undo recent registry changes. Tip # BSOD Replace the hardware. Update the hardware’s firmware. Make sure the hardware is on the Hardware Compatibility List. Check with the manufacturer for support information. Find that a software program is the cause of your Blue Screen of Death? Try this: Reinstall the software. Check for and install any available program updates. Check with the developer for support information. --> IObit Europe Laboratory Team / IObit Europe Team / IMF/ASCU Team <--
  9. IObit Just turns into 7 years old! Happy Birthday! Best Wishes for all of you here and please enjoy this big day. :P --> IObit Europe Team --> IObit IMF/ASCU Team
  10. Welcome . . . a very good idea ! ! ! Congratulations from IObit IMF / ASCU FB team and IObit Europe FB team and IObit Europe LABS team Welcome If you need help, announces you to us cheers
  • Create New...