NUMBER 1 SECURITY RULE: NEVER SURF in ADMINISTRATOR Level. ALWAYS SURF at USER LEVEL.
That way if you mistakenly Download something whoever it was CANNOT take CONTROL at
the ADMINISTRATOR Level. They will have BREAK YOUR ADMINISTRATOR PASSWORD FIRST to take CONTROL of YOUR MACHINE at LOCAL_MACHINE in the Registry.
NUMBER 2 SECURITY RULE : ALWAYS KEEP AN ADMINISTRATOR LOG Showing What YOU DOWNLOADED,
WHAT ADMINISTRATIVE TASKS PERFORMED other than scheduled Anti-Virus or Ant-Malware Sweeps.
NUMBER 2A SECURITY RULE : NEVER APPROVE ANY SOFTWARE YOU ARE NOT ABSOLUTELY SURE OF WHEN ASKED TO APPROVE BY a PROTECTION PROGRAM like your FIREWALL ( Sygate Personal Firewall
Pro) or Black ICE or Spybot Search & Destroy. WRITE DOWN the EXACT NAME & FILE of the
SOFTWARE, THEN DENY APPROVAL, THEN RESEARCH IT LATER TO FIND OUT IF IT IS MALICIOUS or
Many freeware programs, and P2P programs like Grokster, Imesh, Kazaa and others are amongst the most notorious, come with an enormous amount of bundled spyware that will eat system resources, slow down your system, clash with other installed software, or just plain crash your browser or even Windows itself. If you insist on using a P2P program, please read This Article written by Mike Healan of Spywareinfo.com fame. It is an updated and comprehensive article that gives in-depth detail about which P2P programs are "safe" to use.
2.) Go to IE > Tools > Windows Update > Product Updates, and install ALL High-Priority Security Updates listed.
If you're running Windows XP, that of course includes the Service Pack 2! If you suspect your computer is infected with Malware of any type, we advise you to not install SP2 if you don't already have it. You can post a HijackThis log on our Forums to get free Expert help cleaning your machine. Once you are sure you have a clean system, it is highly recommended to install SP2 to help prevent against future infections.
It's important to always keep current with the latest security fixes from Microsoft.
Install those patches for Internet Explorer, and make sure your installation of Java VM is up-to-date. There are some well known security bugs with Microsoft Java VM which are exploited regularly by browser hijackers.
3.) Open IE and go to Internet Options > Security > Internet, then press "Default Level", then OK. * Now press "Custom Level."
In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
Now you will be asked whether you want ActiveX objects to be executed and whether you want software to be installed.
Sites that you know for sure are above suspicion can be moved to the Trusted Zone in Internet Option > Security.
So why is ActiveX so dangerous that you have to increase the security for it?
When your browser runs an activex control, it is running an executable program. It's no different from doubleclicking an exe file on your hard drive.
Would you run just any random file downloaded off a web site without knowing what it is and what it does?
It will protect you from most spy/foistware in it's database by blocking installation of their ActiveX objects.
Download and install, download the latest updates, and you'll see a list of all spyware programs covered by the program (NOTE: this is NOT spyware found on your computer)
Press "Enable All Protection", and you're done.
The spyware that you told Spywareblaster to set the "kill bit" for won't be a hazard to you any longer.
Although it won't protect you from every form of spyware known to man, it is a very potent extra layer of protection.
Don't forget to check for updates every week or so.
5.) Let's also not forget that Spybot Search & Destroy has the Immunize feature which works roughly the same way. Another feature within Spybot is the TeaTimer option. This option immediately detects known malicious processes wanting to start and terminates them. TeaTimer also detects when something wants to change some critical registry keys and gives you an option to allow them or not.
6.) Microsoft now offer their own free malicious software blocking and removal tool, "Windows Defender" (Not compatible with Windows 98 and ME.) In addition, it features real time protection by guarding over fifty (50) ways spyware can enter your PC.
7.) Another excellent program by Javacool we recommend is SpywareGuard.
It provides a degree of real-time protection solution against spyware that is a great addition to SpywareBlaster's protection method.
8. ) IE-SPYAD puts over 20,000 sites in your restricted zone, so you'll be protected when you visit innocent-looking sites that aren't actually innocent at all. Another good hosts program is mvpshosts. This little program packs a powerful punch as it block ads, banners, 3rd party Cookies, 3rd party page counters, web bugs, and many hijackers. For information on how to download and install, please read this tutorial.
*It is important to note that all of the above programs/files can be run simultaneously on your system. They will work together in layers, so to speak, to help protect your computer. However, the following suggestions are designed to only run one of each. It is not a good idea to run more than one firewall, and one anti-virus program. Running more than one of these at a time can cause system crashes, high system usage and/or conflicts with each other.*
9.) It is critical that you use a firewall to protect your computer from hackers. We don't recommend the firewall that comes built in to Windows. It doesn't block everything that may try to get in, and the entire firewall is written to the registry. As various kinds of malware hack the Registry in order to disable the Windows firewall, it's far preferable to install one of the excellent third party solutions. Three good ones that are freeware to boot are ZoneAlarm, Kerio and Sygate.
The trial version of Sunbelt Kerio Personal Firewall will also work in "free mode" after the trial period expires.
10.) An Anti-Virus product is a necessity. There are many excellent programs that you can purchase. However, we choose to advocate the use of free programs whenever possible. Some very good and easy-to-use free A/V programs are AVG, Avast, and AntiVir. It's a good idea to set these to receive automatic updates so you are always as fully protected as possible from the newest virus threats.
11.) Finally, after following up on all these recommendations, why not run
Jason Levine's Browser Security Tests.
They will provide you with an insight on how vulnerable you might still be to a number of common exploits.
Happy safe computing!!
Tony <-> CLSID List - A Collection of Autostart Locations
A Good Registry Cleaner and Good Registry Cleaners will get rid of a host of errors. The most common ones we have run into are shown below:
Runtime Error- Any error that happens when a program is running or trying to run..
ActiveX Error- ActiveX errors are causeds by misconfigured addons and browser settings.
DLL Error -DLL files are support files. Errors often occur because of installation or removal of programs.
.exe Error - Exta or incorrect entries in the system regisgtry can cause .exe errors during system or program startup
General Protection Fault - Usually caused by a program that violates windows memory allocation.
Blue Screen of Death - One of the worst errors the only way to fix it is to reboot and hope it doesn't happen again.
Windows Explorer Error - Explorer is the GUI of windows and is often susceptible to corruption.
iExplore or iExplorer Error - Errors often occur in Internet Explorer becuase of toolbars, and browser addons
Access Violation -A memory error that occurs when one application access memory not allocated for it.
System32 Error - Windows system error caused by missing or corrupt system files.
Windows Installer Error - Usually appears after failed installation of MSI Package or Disabled "Windows Installer" service.
The best thing you can do to fix computer problems is to scan and fix any registry errors you have. This will get your computer in optimal shape and have your frustration level back down to normal levels
Internet Security Articles from http://articles.enter.fm