2009 Aug 22
| Attack Information | Common Criteria | Cryptology | Data Hiding and Finding | Documents and Links | 
| Phishing | Security Risk Scoring | Standards | Tools & Info | Top 25 SW Errors | Web Errors | 
As always, research everything before removing it. Some weird looking files might be system/program critical. Steps for finding virsus and malware.
Getting rid a of a root kit
| Name | Function | 
|---|---|
| CleanIt! | removes temp files | 
| HijackThis! | to view/fix startup behavior | 
| Spyware Search & Destroy | latest version, catch registry changes and note the rogue processes | 
| Process Explorer | to know what is running on you pc | 
| Process Monitor | to log process activity, especially on startup | 
| BruteForceUninstaller | to delete files that evade normal deletion methods | 
| Kapersky online scanner | a good free virus & mal/spyware scanner | 
| Panda online scanner | a good free virus & mal/spyware scanner | 
| RootkitRevealer | does a deep search into registry and others for inconsistancies | 
| VirusTotal.com | site to do multiple scans of any file (has uploader utility) | 
| ThreatFire | |
| spamgourmet.com | |
| Qualys.com | vulnerability management | 
| Trend Micro | full security SW | 
| Bit Defender | full security SW | 
| Cyberdefender | full security SW | 
| F-secure | full security SW | 
| Kaspersky | full security SW | 
| PC Tools | full security SW | 
| ComboFix | |
| DDS | |
| GMer | |
| Little Snitch | Mac tool for monitoring and stopping outgoing network traffic | 
2005-2009