2010年5月17日星期一

May 14 Kaspersky KEY (KIS9.0)

Give you updates to this, I hope you download the happy Oh, what our proposals also please leave a message oh message bar.


File download Address:

http://code.google.com/p/ahong5188/downloads/detail?name=Kaspersky-KEY-KIS9.rar&can=2&q=#makechanges

2010, the latest ranking of Antivirus Software

1. G-Data Antivirus 2010

2. Symantec Norton Antivirus 2010(诺顿)

3. Kaspersky Lab Anti-Virus 2010(卡巴斯基)

4. BitDefender Antivirus 2010

5. Panda Antivirus Pro 2010(熊猫卫士)

6. F-Secure Anti-Virus 2010

7. Avira AntiVir Premium(小红伞)

8. Trend Micro AntiVirus Plus AntiSpyware 2010(趋势科技)

9. Eset Nod32 Antivirus 4

10. McAfee Antivirus Plus 2010

11. Alwil Avast! 4.8 Professional Edition

"Cup with the desktop," Trojan horses wreaked havoc

Recently, a number of the user's computer desktop problems have emerged. According to computer analysis of anti-virus experts, this is a recently named "Cup with the desktop," the Trojan horse virus caused.
Rising through "cloud security" virus samples library depth analysis of this virus was found, the user describes the phenomenon is Trojan.Script.VBS.StartPage.gu ("Cup with Desktop" Trojan) trace the ghost, the user may be in the downloaded some pirated games or software, infected with the virus. Virus running, load the virus script file using the system, tamper with all the shortcuts on the desktop, allowing users to click the icon looks like a normal, run the virus, to visit a malicious hacker designated site navigation. Security experts suggest that users not to download unknown unsolicited information, timely anti-virus software upgrade to the latest version.

Bai Yujia entrance site was implanted Trojan

360 Security Center yesterday disclosed a malicious web page monitoring data shows that with the entrance into the countdown, hackers take the opportunity to spread Trojans. According to the 11th day of monitoring, the domestic horse's entrance was implanted over 122 sites, involving online entrance counseling, review the information on the page. This trend is expected to share Malaysia will continue hanging, candidates and parents must be open while browsing Anti-Trojan.

Microblogging into new ways to spread the virus hacker

As the latest Internet communication, microblogging to a highly open, randomness, real-time sharing of the characteristics of concern. With the rapid growth of micro-Bo user, network hackers sniffed inside the enormous business opportunities to black hands toward the beginning of this emerging online media.
Currently several micro-Bo on the portal, there have been varying degrees of both hackers release fishing sites, linked to the phenomenon of horse links, hackers use microblogging huge popularity, luring those who fall into the trap of concern, take the opportunity to steal the microblogging accounts password and personal information related to privacy, in order to gain illegal benefits. Even hackers use to steal account login microblogging to bloggers as profit from the publication of false news.
Anti-virus experts have warned that the general micro-Bo user, visit the micro-Bouche Do not click on unknown sites and links, gullible unknown information, be sure to click on exit button in the security exit. Regular cleaning Internet history traces, clear log automatically records when the micro-Bo the user name and password, do not give hackers an opportunity.

"Picture" back door the temptation to be careful Big Figure

Virus broadcast
According to anti-virus experts, was intercepted in a recent use of "image" spread the hacker back door, because the virus uses tempting to lure users to click on the name, together with ordinary users that the "image" files generally will not cause the virus, the virus can lead to infection of a large area, Enables users to remotely control the computer by hackers constantly "taking" personal privacy and the account password and other information.
It is reported that "picture backdoor" virus sends itself disguised as a picture file, confuse the user clicks. User opens the "image", the virus is activated, will start the IE browser, computer background, hidden IE window so users can not detect, then the virus will be injected into IE process, enabling users to remotely control the computer hackers to accept instructions. As the virus is camouflaged image file icon, it may allow users to decrease vigilance

Guard against viruses masquerading picture files

Time :2010-5-17 9:06:03 Author: Source: Beijing Times

Rising With the recent interception of a "picture" the spread of hacker back door, because the virus uses very tempting to lure users to click on the name, resulting in a large area infected with the virus.
Concerned about the virus this week: "Picture the back door (Backdoor.Win32.ECode.rp)". The virus is written in easy language hacker back door, the virus will itself disguised as a picture file, confuse the user clicks. User opens the "image", the virus is activated, then the virus will be injected into the IE process, enabling users to computer hackers remote control instructions received.
Prevention: 1. Use the "Rising full-featured security software 2010", effectively preventing the dissemination through the website linked to horse virus; 2. Kaka Internet Security Assistant 6.2 installed automatically fix vulnerabilities; 3. Can call Customer Service Hotline 400-660-8866 consultation, visit http://csc.rising.com.cn for help.