Spyware Doctor Review

Spyware Doctor Review

Security is essential when it comes to computers. We strongly rely on our PC’s and when they go down you could spend days in frustration. In 1983, Fred Cohen is the one who firstly officially defined the concept of digital virus as “a program that can affect other programs of the computer, modifying them in a way that implies the approach of evolved copies of the programs.” As a consequence of the behavior of viruses, anti viruses were created to counter attack the activity of the malicious software on the computers.
Spyware Doctor with Antivirus is very friendly, providing the users with a simple interface that will allow them to properly understand the options and functions available. Spyware Doctor with Antivirus succeeds to both cleaning your already infected computer from viruses and to prevent virus infections in the future. The most important thing that makes using this program an amazing experience is the fact that it leaves the user having the control. When it scans the computer, the program displays a full report with all the identified threats and all the required information about them (what are they, what are their effects, where are they situated and so on). The next step, of doing something in order to deal with the threats, is up to the users: they can select the infections and choose what to do with them: move them, delete them or simply quarantine them.

Key Points of Spyware Doctor with Antivirus

  • 30 day money back guarantee
  • Automatic updates so you are always protected
  • Removes and blocks virus ( The way they all should work )
  • Free Support
  • Advanced rootkit detection technology
  • Download Guard checks your downloads against a cloud-based network
  • Site Guard blocks malicious websites so you avoid infections from even attempting to install

There are many other smaller features in the new Spyware Doctor with Antivirus 2011 client but with the above you get the idea.

What is the Purpose of Safe Mode?

What is the Purpose of Safe Mode?

Safemode is normally used to help resolve issues you are having and to trouble shoot errors.  While in safe mode many programs will not autostart as well as hardware drivers.  You will notice that your screen may be bigger as well or look a little funky.  This is because the driver for this device is not running.  While in safe mode you may find it easier to run virus removal programs and remove virus threats.

How to Boot Into Safe Mode

How to Boot Into Safe Mode

To Boot into safe mode here is what you have to do.  Feel free to print these directions below.

1.  Shut off your computer

2.  Turn on your computer and start pressing the F8 key every second.  You should see a similar screen to the below image. If Windows Starts to load that means you missed it and will have to try again.

safemodeAllen

 

You will see several options.  The option you want is Safe Mode or Safe Mode with Networking

Safe Mode: Just starts the basic Windows OS with out many drivers and other support options

Safe Mode with Networking: Same as above but the “with Networking” option will allow you to go online and download programs. XP users may need to still turn on their wireless device in the Networking options to connect.

Show hidden files and folders Vista and Windows 7

Show hidden files and folders Vista and Windows 7

Vista and Windows 7: Follow these steps to display hidden files and folders.
1.    Open Folder Options by clicking the Start button, clicking Control Panel, clicking Appearance and Personalization, and then clicking Folder Options.
2.    Click the View tab.
3.    Under Advanced settings, click Show hidden files and folders, and then click OK.

How to Reset Hosts File | XP | Vista | Windows 7

How to Reset Hosts File | XP | Vista | Windows 7

This article describes how to re-set the hosts files for Windows XP, windows vista and Windows 7. Please note a tool has been created from Microsoft to automatically do this for you. We recommend you just use the auto tool in most cases.

To reset the hosts file back to the default, follow these steps:

1. Click Start, click Run, type %systemroot% system32driversetc, and then click OK. You can also open up the My Computer Icon and browse to the location. Note If you are using 64 bit version of Windows, type %systemroot% SysWOW64driversetc.

2. Rename the hosts file to hosts.bak.  To re-name the file you right click on it ans select rename.  You can also just change the file to hostsOLD or something like that.

3. Create the new default hosts file.

To do this, follow these steps:

1. Right-click an open space in the %WinDir%system32driversetc folder, point to New, click Text Document, type hosts, and then press ENTER.

2. Click Yes to confirm that the file name extension will not be txt.

3. Open the new created hosts file in a text editor, for example, in the Notepad. 4. Copy the following text to the file. Keep in minde that everything that follows the  # symbol is null and it does not really matter:

For Windows XP

This is a sample HOSTS file used by Microsoft TCP/IP for Windows.

This file contains the mappings of IP addresses to host names. Each entry should be kept on an individual line. The IP address should # be placed in the first column followed by the corresponding host name. The IP address and the host name should be separated by at least one # space.

Additionally, comments (such as these) may be inserted on individual # lines or following the machine name denoted by a symbol. For example:

102.54.94.97 rhino.acme.com # source server # 38.25.63.10 x.acme.com # x client host 127.0.0.1 localhost

For Windows Vista

This is a sample HOSTS file used by Microsoft TCP/IP for Windows.

# # This file contains the mappings of IP addresses to host names. Each # entry should be kept on an individual line. The IP address should # be placed in the first column followed by the corresponding host name. # The IP address and the host name should be separated by at least one # space. # # Additionally, comments (such as these) may be inserted on individual # lines or following the machine name denoted by a ‘#’ symbol. # # For example: # # 102.54.94.97 rhino.acme.com # source server # 38.25.63.10 x.acme.com # x client host 127.0.0.1 localhost ::1 localhost

For Windows 7

# Copyright (c) 1993-2006 Microsoft Corp. #

# This is a sample HOSTS file used by Microsoft TCP/IP for Windows. #

# This file contains the mappings of IP addresses to host names. Each

# entry should be kept on an individual line. The IP address should

# be placed in the first column followed by the corresponding host name.

# The IP address and the host name should be separated by at least one # space. #

# Additionally, comments (such as these) may be inserted on individual

# lines or following the machine name denoted by a ‘#’ symbol. #

# For example: # # 102.54.94.97 rhino.acme.com # source server # 38.25.63.10 x.acme.com # x client host

# localhost name resolution is handle within DNS itself.

# 127.0.0.1 localhost

# ::1 localhost 5. Save and close the file.

No Internet after virus infection. What to do?

Even after a virus has been removed, you may have trouble accessing the Internet, as the virus makes permanent changes to the components of Windows that help you to go online. Here are 4 steps you can take to get your internet connection back up and going.  All 4 methods do different things so if one does not work you can move onto the next.

Method 1

Uncheck the proxy usage box in Internet Explorer. Some viruses will redirect your computer to proxy servers in order to perform malicious tasks. You may need to reset these settings after the virus has been removed. In order to do this, open Internet Explorer, then go to Tools->Internet Options. In this dialog box, choose Connection Settings tab. Here click on the LAN Settings button.

This will have two main checkboxes, one to detect internet settings automatically and another to user a Proxy server. Make sure that the Proxy server checkbox is unchecked. Hit OK in this dialog box and in the internet options dialog box as well, and your proxy settings will be turned off.

Method 2

The next solution you could try to get yourself back online is to reset the settings of Internet Explorer, which is your web browser. Viruses tend to change its settings in order to redirect you to malicious websites, and therefore it helps to reset these settings. Resetting Internet Explorer settings will practically give you a fresh copy of Internet Explorer on your computer. The basic method to manually reset Internet Explorer is:

•    Exit all programs, including Internet Explorer
•    Hold WinKey + R, and in the dialog box, type inetcpl.cpl and click ok
•    Click on the Advanced Tab
•    Under Resent Internet Explorer Settings, click Reset, and then click Reset again
•    Once the resetting is complete, close the dialog box and restart Internet Explorer

Alternatively you could just open up IE and under the Tools Menu select Internet Options, Then select the Advanced Tab and select the Reset button.

Method 3

Another solution that you could attempt to do is to reset the Windows Hosts File. The Windows Hosts File contains mappings of websites to IP addresses on the Internet. Windows uses this to redirect the web browser to the correct website on the Internet. However, some viruses tend to edit the Windows Hosts File so that you get redirected to malicious websites whenever you attempt to browse the internet. Therefore if you have no internet after virus infection, you should attempt to reset the Windows Hosts Files as well. This can be done as follows:

•    Hold WinKey + R, and in the dialog box, type %systemroot%\System32\drivers\etc, and click OK.
•    Rename the hosts file to hosts.bak
•    Create a new default hosts file by right-clicking on an open space in the %WinDir%\System32\drivers\etc folder, pointing to New, and clicking Text Document typing hosts, and pressing Enter.
•    Open the newly created file in a text editor, and enter the following code:

# Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a ‘#’ symbol.
#
# For example:
#
#      102.54.94.97     rhino.acme.com          # source server
#       38.25.63.10     x.acme.com              # x client host

127.0.0.1       localhost

Save the file as hosts in the above folder destination.

Method 4

The first thing you could do is to use Winsock to clean up your internet connection settings. This free software application can be downloaded easily on many websites and will fix any problems with Windows Sockets or with the Windows Registry which might be causing network problems with your computer. It also contains the option of backing up the registry before attempting to fix it, therefore you are secure in case any mistake occurs.

XP Users can download the software at : http://majorgeeks.com/WinSock_XP_Fix_d4372.html

Win 7 users and Vista users have to do this manually:  Here is how
1. Open up the command line utility and enter:
netsh winsock reset catalog (resets winsock entries)
netsh int ip reset reset.log hit (resets TCP/IP stack)
2. Reboot your PC

How to Use msconfig

How to Use msconfig

The System Configuration manager can be used to manage the programs that auto start when your computer boots.  In most cases malware clients and plenty of other virus threats will be shown here.  You can use the Startup Manager to stop the virus threat from starting when your computer starts.  It can also be used to help locate the file location of the virus so you can delete the virus.

1. Click the Windows Start Button on the Bottom left

2. In the run command box type in “msconfig” with out the quotes and hit enter.

3. Select the Startup Tab as shown below

system-configurationDallas

All the checked boxes in the Startup Item Column means the program will start when the computer boots up.  If you have a virus trace you can un-check the box so the program will not start.  You can also view the file location in the command column and browse to that file trace and re-name or delete the offending file.

virus-in-boxDallas

So now you can uncheck the virus threats and re-boot your computer.  On boot up they should no longer load and you also now know the location of the virus threats and can delete them.

Avoid Viruses

Tips on Avoiding Viruses Online

1. Don’t Install Programs Unless You Trust The Source

If everyone out there followed this advice malware would be almost none existent as they crooks would not be making enough money to keep the scam going. Only install software products from websites you trust. If you do not trust he website don’t install it. Most of the malware out there takes user intervention for the client to install on your computer.

2. Use a Paid Antivirus Client

Free clients do not provide the protection you need online. You need up front live protection, real time updates and a whole round other other tools to really protect your computer online. No free client out there is good enough. I fight with experts in the field all the time about this. I’ve been dealing with viruses since 1999, in the past free clients could get the job done. In today’s world you need to pay for protection to really be secured. Free clients all have a Pro version. If you like the software upgrade to the paid version.

3. Don’t Click on Junk E-mail

Avoid junk e-mail. The see Brittany Spears nude or loose weight now e-mails are scams. Don’t even open it. Just delete the e-mail and move on.

4. Avoid Warez, torrent and porn sites.

The above take up a large share of infected websites. Religious websites also take up a large chunk of infected websites but that is mostly because they are poorly run and easily hacked. In those cases it’s not intentional. However warez, torrent and porn sites have tons of bad viruses intentionally put there to infect computers.

5. Use Only a Credit Card When Ordering Online

Quick Tip for Parents:

Children are naturally more trusting. They need help to protect themselves and the computer. You need to do your part in protecting the computer and limit their use. You should password protect the admin account on the computer as well as your account and create new accounts for the children. Those new accounts should be limited accounts. On a limited account it’s much hard to get a virus as they do not have install permissions. Doing this can really help protect the computer from a virus.

Avoid Online Scams

Tips on Avoiding being Scammed online

1. Don’t Trust Any Link

This could be a link a friend sent you in a social profile or a link in an e-mail from your bank or Paypal. Don’t trust any links in an e-mail. Never follow a link in an e-mail if it’s from a source you have an account with like a bank or Payment interface like Paypal or Credit Card. Instead go directly to the website and check the account. Thieves always try to build phishing websites to capture data.

2. Purchase an Antivirus client.

Not a free client. Paid clients have plenty of extra tools such as phishing protection that blocks known bad websites. You are better served with a paid client over a fake client. People will hate on me for saying this but it’s true. I’ve been in the field for well over a decade. I know what I’m talking about.

3. Don’t Click on Link in Junk E-mail

Lot’s of viruses are in these links and even more scams. Avoid them. You did not win anything. There is no make a million over night free simple method. There is no miracle grow your @#$@ pill out there. Avoid it and save your money.

4. If the Online Store Does Not Have a Phone Number Don’t Purchase From Them

Now there are legit stores out there with no phone number online. However those are few and far between. Avoid any online store with no phone number. Even if it’s not a scam, how are you going to get a hold of someone if the product sent is wrong. It’s just not worth it. If a phone number is listed. CALL IT!. This will ensure someone is on the other side. If they won’t answer to take an order you sure as help aren’t going to get support if you get the wrong product.

5. Use Only a Credit Card When Ordering Online

Credit cards have protection when ordering online. If someone steals that credit card number and charges it’s you will not be held liable for the vast majority of the purchases. A debit card is not a credit card. Be safe when ordering online and use a credit card. I myself hate the bastards and feel they are out to cheat you, but at least there are consumer laws to help protect you. Charge it and pay it off right away.

6. Do a Quick Search Online For the Company You are Buying From

It could be something simple like the domain name plus review or looking up the company on BBB. I would still purchase from a company if there are negative reviews. My own website removevirus.org has plenty of negative reviews from idiots who think I actually make viruses. The idea is to find out if the company is a scam. From there on out you can make an informed choice.

7. Don’t Purchase Illegal Items

I should not have to state this but I know plenty of people who were scammed in this area. I was once when I was young and purchased a fake ID online. I of course was scammed. Organized crime flourishes here because they know you are not going to call the cops to report you purchasing an illegal item.

8. Don’t Trust FREE Products

If the product says it’s free or has a free trial I would not trust it. It’s different if it’s software based as almost all software programs have free trials. If it’s a product, just move on and don’t get it. They will say it’s only 5 bucks for shipping but 7 days later you are charged 100 dollars and each month you get charged again and again. It’s just not worth it. Big scams are in the Make money online niche, teeth whitening, weight loss like acciberry and other crap product like penis pills (No I don’t know from experience). Just avoid these fake products and don’t trust the reviews as most are made up. Basically if it’s an ad online and says free, Don’t Trust It.

9. Don’t send money out of the US or even out of Sate unless you know the person well.

Graiglist has millions of these scams. Purchase this car or rent this home for some super cheap price. They will say something like they are in the military or a doctor doing charity work and are out of the country. It’s all crap. Don’t fall for it. Even sending money to Canada is not a smart idea. Person to person transactions have the highest risk of being a scam. Always do your homework. ensure they own the property. Even getting them on the phone does not mean it’s not a scam.

Bottom line is to question everything. Before you make any purchase think to yourself, is this a scam. Do I trust this company or person? If the answer is no then don’t make the purchase or at the very least make more inquiries.