2009 Aug 22
Attack Information |
Common Criteria |
Cryptology | Data Hiding and Finding |
Documents and Links |
Phishing | Security Risk Scoring |
Standards | Tools & Info |
Top 25 SW Errors |
Web Errors |
As always, research everything before removing it. Some weird looking files might be system/program critical. Steps for finding virsus and malware.
Getting rid a of a root kit
Name | Function |
---|---|
CleanIt! | removes temp files |
HijackThis! | to view/fix startup behavior |
Spyware Search & Destroy | latest version, catch registry changes and note the rogue processes |
Process Explorer | to know what is running on you pc |
Process Monitor | to log process activity, especially on startup |
BruteForceUninstaller | to delete files that evade normal deletion methods |
Kapersky online scanner | a good free virus & mal/spyware scanner |
Panda online scanner | a good free virus & mal/spyware scanner |
RootkitRevealer | does a deep search into registry and others for inconsistancies |
VirusTotal.com | site to do multiple scans of any file (has uploader utility) |
ThreatFire | |
spamgourmet.com | |
Qualys.com | vulnerability management |
Trend Micro | full security SW |
Bit Defender | full security SW |
Cyberdefender | full security SW |
F-secure | full security SW |
Kaspersky | full security SW |
PC Tools | full security SW |
ComboFix | |
DDS | |
GMer | |
Little Snitch | Mac tool for monitoring and stopping outgoing network traffic |
2005-2009