2009 Aug 22
| Attack Information |
Common Criteria |
Cryptology | Data Hiding and Finding |
Documents and Links |
| Phishing | Security Risk Scoring |
Standards | Tools & Info |
Top 25 SW Errors |
Web Errors |
As always, research everything before removing it. Some weird looking files might be system/program critical. Steps for finding virsus and malware.
Getting rid a of a root kit
| Name | Function |
|---|---|
| CleanIt! | removes temp files |
| HijackThis! | to view/fix startup behavior |
| Spyware Search & Destroy | latest version, catch registry changes and note the rogue processes |
| Process Explorer | to know what is running on you pc |
| Process Monitor | to log process activity, especially on startup |
| BruteForceUninstaller | to delete files that evade normal deletion methods |
| Kapersky online scanner | a good free virus & mal/spyware scanner |
| Panda online scanner | a good free virus & mal/spyware scanner |
| RootkitRevealer | does a deep search into registry and others for inconsistancies |
| VirusTotal.com | site to do multiple scans of any file (has uploader utility) |
| ThreatFire | |
| spamgourmet.com | |
| Qualys.com | vulnerability management |
| Trend Micro | full security SW |
| Bit Defender | full security SW |
| Cyberdefender | full security SW |
| F-secure | full security SW |
| Kaspersky | full security SW |
| PC Tools | full security SW |
| ComboFix | |
| DDS | |
| GMer | |
| Little Snitch | Mac tool for monitoring and stopping outgoing network traffic |
2005-2009