-Does your computer fail to bootup?
-Does your computer freeze and reboot?
-Cannot access your data due to the lost password?
-Does your computer contain critical data?
-Don't have a recent backup?
-Reformatted your harddrive?
-Accidentally deleted files?

Our blog will provide the relevant information on free tools, techniques, and approaches to recover your computer and get your valuable data back.

Showing posts with label Trojans. Show all posts
Showing posts with label Trojans. Show all posts

Online security scanner from Trend Micro

Trend Micro's HouseCall, maybe, is not the best free online security scanner on the market. It is slower than some competitors; it may be less effective than others. However, it is the only one out of the top online scanners, offering not just detecting the virus contamination or security threat, but also cleaning or deleting of infected files from wide range of threats including viruses, worms, Trojans, and spyware. In addition, Trend Micro HouseCall seeks out firewall problems and other vulnerabilities, and makes suggestions for correcting them.

Please note that HouseCall requires a small download before it can scan your computer.

 Getting Started with HouseCall

  1. Click Download HouseCall to begin. The file to download differs in relation to your Operating System, soc choose the option (32-bit or 64-bit), which suites you.
  2. You can choose to save a copy of the launcher (HousecallLauncher.exe) and use it to quickly starts scan. Remember to visit this page occasionally to get the latest copy of the launcher.
  3. It is recommended that first-time users select the Quick Scan option, which is available in addition to the Full Scan or Folder Scan options.
  4. Enabling the Smart Feedback setting helps increase the strength of the Smart Protection Network by sharing malware and threat data as part of our global neighborhood watch program. No personally identifiable information is gathered as part of participation.
System Reqiurements

Hardware

  • At least 300MHz IntelTM PentiumTM processor or equivalent
  • At least 256MB memory
  • At least 200MB available disk space
Operating System

  • Windows™ XP (32-bit) Home or Professional with SP2 or SP3
  • Windows Vista™ (32-bit, 64-bit) Ultimate, Business, Home Premium, or Home Basic with SP1 or SP2
  • Windows 7 (32-bit, 64-bit)
Display

  • At least high-color (16-bit) and a minimum resolution of 1024x768 pixels
Review of HouseCall (32-bit version) by PCWorld

Trend Micro--one of the most respected companies in security software--offers HouseCall, a free Web-based utility that scans for and cleans your computer of all currently documented viruses, Trojans and other malware. In addition, HouseCall seeks out firewall problems and other vulnerabilities, and makes suggestions for correcting them. We do not recommend using HouseCall in lieu of an installed security program. But it has saved our computers numerous times, when all else failed. Its new version is not only compatible with Windows 7, but you can download either a 32-bit or 64-bit version of its launcher.

Setting up HouseCall is a breeze. You can choose to do a Quick Scan, Full Scan or Custom Scan (choosing which drives and folders-- including connected network drives--will be analyzed). If you're in a hurry, you may also want to check the option to have HouseCall fix all found problems. If you prefer to look at each problem found, and select which ones to fix, leave that option unchecked.

Then, click on Scan Now, and sit back and wait. Depending on the size and density of your drives, the type scan you choose, the speed of your computer, and the speed of your internet connection, it can take fifteen minutes (for a Quick Scan of critical system files) to several hours (for Complete or comprehensive Custom Scans). Our Custom Scan of all folders and files on two local and four network drives took five hours and four minutes.

Unlike previous versions of HouseCall, which ran completely online, this newest iteration uses a downloadable launcher. That means you no longer have to worry about browser compatibilities or having the latest Java installed. During the scan, the launcher first verifies that you have the latest version of the program, and automatically downloads any updates you might need, before actually launching. We feel that is an extra step that shouldn't be necessary, when you've just downloaded the launcher; shouldn't it be the newest version already? Once launched, HouseCall Then, it checks file patterns on your computer against Trend Micro's latest database of malicious files, via your Internet connection. A progress bar and timer tell you how much time has lapsed and the percentage of the job that is complete, so you can walk away and know approximately when to return.

When the scan is complete, HouseCall generates a report of all threats found and actions taken to fix the problems. It also provides information for any that were found but not repaired, so that you can investigate further. This time around, it found nothing on our test system--happily. Other times that we've used it, HouseCall has located and neutralized considerable threats to our systems.

Trend Micro is known for its aggressive and frequent updates of malware definitions, which means that HouseCall will catch the vast majority of active malicious files that might lurk in your system. But, because of its thoroughness, HouseCall can be time-consuming. It's best to run it at a time when you aren't planning to use your computer, such as overnight.

HouseCall is a great resource for anyone who suspects that their computer woes may be related to malicious files--or for those who just want to double-check that their installed security program is doing its job.

Review of HouseCall (32-bit version) by BrightHub

Ease of Use

To use the Trend Micro HouseCall free scan, users will need to download a small launcher program (Housecalllauncher.exe), which is available in 23-bit and 64-bit versions to support older and new operating systems such as Windows 7. Once the launcher is downloaded, the user is required to run the program, which will download all the required components and ready itself to scan the computer. The scanning options include a full, custom (including folder specific scans) as well as a quick scan.

Users have the option of allowing the program to share threat data with “a global intelligence network to quickly discover new threats” according to the Trend Micro HouseCall website. Unlike some other online scanners, HouseCall not only detects threats but it can remove them as well. In fact, the program can be set to auto clean, which is a feature that tries to remove threats automatically, or users can choose to perform the removal tasks manually if malware is detected.

One major advantage that HouseCall has over traditional virus scanning solutions is that it is always up-to-date. The service doesn't rely on periodic software definition downloads to be able to detect viruses. Users are assured that the latest virus definition files are being used for each scan because the launcher always fetches the newest definitions prior to starting a scan. In a search for the best online virus scanners, you will be hard pressed to find a better alternative to HouseCall.

The Performance

Trend Micro HouseCall and its free virus scan, like many other online scanners, is generally available to everyone who has Internet service. However, its reliance on the Internet in order to perform a scan, is its Achilles heel. There are certain malware that will impair the computer’s ability to access the Internet, making it nearly impossible or at least technically challenging to remove malware using online scanners.

However, once the scanner downloads the required components, it does a good job of scanning the computer for viruses without hogging system resources. It's not surprising that the program is not a system hog, however. Bear in mind that it doesn't run all the resident shields and active protection components of a full fledge virus scanner.

Developers’ Website: http://housecall.trendmicro.com/


20 Common Types of Computer Viruses and Other Malicious Programs

What is Computer Virus?

Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.

Computer viruses are often spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.

Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.

How Computer Viruses Work?

Here is the general way that viruses work:
  1. An infected program is run. This is either a program file (in the case of a file-infecting virus) or a boot sector program at boot time. In the case of a Microsoft Word document the virus can be activated as soon as the document that contains it is opened for reading within Microsoft Word. If the "NORMAL.DOT" document template is infected (and this is the most common target of these viruses) then the virus may be activated as soon as Microsoft Word is started up.
  2. The infected program has been modified so that instead of the proper code running, the virus code runs instead. This is usually done by the virus modifying the first few instructions to "jump" to where the virus code is stored. The virus code begins to execute.
  3. The virus code becomes active and takes control of the PC. There are two ways that a virus will behave when it is run: direct-action viruses will immediately execute, often seeking other programs to infect and/or exhibiting whatever other possibly malicious behavior their author coded into them. Many file-infector viruses are direct-action. In contrast, memory-resident viruses don't do anything immediately; they load themselves into memory and wait for a triggering event that will cause them to "act". Many file infectors and all boot infectors do this (boot infectors have to become memory resident, because at the time they are executed the system is just starting up and there isn't that much "interesting" for them to do immediately.)
  4. What exactly the virus does depends on what the virus is written to do. Their primary goals however include replication and spreading, so viruses will generally search for new targets that they can infect. For example, a boot sector virus will attempt to install itself on hard disks or floppy disks that it finds in the system. File infectors may stay in memory and look for programs being run that they can target for infection.
  5. "Malevolent" viruses that damage files or wreak havoc in other ways will often act on triggers. There are viruses that will only activate on particular days of the year (such as the infamous "Friday the 13th"), or act randomly, say, deleting a file every 8th time they are run. Some viruses do nothing other than trying to maximize their own infection to as many files and systems as possible.
Most Common Types of Viruses and Other Malicious Programs

1. Resident Viruses

This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.

Examples include: Randex, CMJ, Meve, and MrKlunky.

2. Multipartite Viruses

Multipartite viruses are distributed through infected media and usually hide in the memory. Gradually, the virus moves to the boot sector of the hard drive and infects executable files on the hard drive and later across the computer system.

3. Direct Action Viruses

The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.

4. Overwrite Viruses

Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.

The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.

Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.

5. Boot Virus

This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive.

Examples of boot viruses include: Polyboot.B, AntiEXE.

6. Macro Virus

Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.

7. Directory Virus

Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus.

Once infected it becomes impossible to locate the original files.

8. Polymorphic Virus

Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves.

Examples include: Elkern, Marburg, Satan Bug, and Tuareg.

9. File Infectors

This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belongs to this category, and can be classified depending on the actions that they carry out.

10. Encrypted Viruses

This type of viruses consists of encrypted malicious code, decrypted module. The viruses use encrypted code technique which make antivirus software hardly to detect them. The antivirus program usually can detect this type of viruses when they try spread by decrypted themselves.

11. Companion Viruses

Companion viruses can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they "accompany" the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).

Some examples include: Stator, Asimov.1539, and Terrax.1069

12. Network Virus

Network viruses rapidly spread through a Local Network Area (LAN), and sometimes throughout the internet. Generally, network viruses multiply through shared resources, i.e., shared drives and folders. When the virus infects a computer, it searches through the network to attack its new potential prey. When the virus finishes infecting that computer, it moves on to the next and the cycle repeats itself.

The most dangerous network viruses are Nimda and SQLSlammer.

13. Nonresident Viruses

This type of viruses is similar to Resident Viruses by using replication of module. Besides that, Nonresident Viruses role as finder module which can infect to files when it found one (it will select one or more files to infect each time the module is executed).

14. Stealth Viruses

Stealth Viruses is some sort of viruses which try to trick anti-virus software by intercepting its requests to the operating system. It has ability to hide itself from some antivirus software programs. Therefore, some antivirus program cannot detect them.

15. Sparse Infectors

In order to spread widely, a virus must attempt to avoid detection. To minimize the probability of its being discovered a virus could use any number of different techniques. It might, for example, only infect every 20th time a file is executed; it might only infect files whose lengths are within narrowly defined ranges or whose names begin with letters in a certain range of the alphabet. There are many other possibilities.

16. Spacefiller (Cavity) Viruses

Many viruses take the easy way out when infecting files; they simply attach themselves to the end of the file and then change the start of the program so that it first points to the virus and then to the actual program code. Many viruses that do this also implement some stealth techniques so you don't see the increase in file length when the virus is active in memory.

A spacefiller (cavity) virus, on the other hand, attempts to be clever. Some program files, for a variety of reasons, have empty space inside of them. This empty space can be used to house virus code. A spacefiller virus attempts to install itself in this empty space while not damaging the actual program itself. An advantage of this is that the virus then does not increase the length of the program and can avoid the need for some stealth techniques. The Lehigh virus was an early example of a spacefiller virus.

17. FAT Virus

The file allocation table or FAT is the part of a disk used to connect information and is a vital part of the normal functioning of the computer. 

This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.

18. Worms

A worm is technically not a virus, but a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses.

Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.

19. Trojans or Trojan Horses

Another unsavory breed of malicious code (not a virus as well) are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms.

20. Logic Bombs

They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs.

Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.

Sources and Additional Information:

A-squared Anti-Malware and Anti-Trojan Freeware - Epsilon Award Winner 2009

You want to use the best freeware possible in all categories. But who can tell you, which one is the best? Definitely, there is no single opinion, and no single review, which can be considered as absolute truth. Still, all the reviewers’ ratings and rewards, given to the particular utility, enhance its reputation and credibility.

Emsi Software announced that winner for 2009 competition among all anti-malware utilities is a-squared Anti-Malware, and the Epsilon award has been presented to the authors at the annual European Software Conference (Berlin, November 2009).

Donna Buenaventura, a highly respected security software expert and MVP, compared a-squared Anti-Malware with another respectable utility Malwarebytes – with the following comparison results:
A-squared Free won in the major categories.

  • Malware Detection - Winner: a-squared Free.
    Of 100 malware samples, a-squared Free found 92, Malwarebytes' Anti-Malware only 58.
  • Removal of Detected Malware Samples - Winner: a-squared Free.
    A-squared Free was able to remove all detected samples without the need for a system restart.
  • Performance - Scanning - Winner: a-squared Free.
    A-squared Free finished a full scan of the system drive in 29 minutes, Malwarebytes' Anti-Malware took 1 hour and 24 minutes.
  • Options and Feature - Winner: a-squared Free.
    A-squared Free lets you run a quick, smart, custom, right-click, silent, command line and deep system scans.
With a-squared Free, you can scan your PC for infections of Trojans, Viruses, Spyware, Adware, Worms, Bots, Keyloggers and Dialers. Note that instead of a single scanner, you can double in the same product: Anti-Virus + Anti-Spyware. There are not just any scanners, but a combination of two world class products - the a-squared Anti-Spyware, and the Ikarus Anti-Virus engine. Latest tests approve that both are cutting edge in Malware detection.

No doubling of the scan duration as it would be the case with two separate scanning programs. Considerable performance improvement is possible thanks to the integration of the two engines on the lowest level.

What is detected by a-square Free?

  • Trojans, Backdoors, Keyloggers
    Trojans and Backdoors provide strangers with access to your PC. Once a Backdoor is installed, an attacker can take full control of your computer. A Trojan is best described as a piece of software pretending to be something it is not - they often contain Backdoors, and usually arrive as email attachments. A Keylogger is a type of Malware that invisibly records all keyboard activity. a-squared Free specializes in recognizing and eliminating these types of Malware.

  • Spyware, Adware, TrackingCookies
    Your personal data and information is worth a great deal of money to certain advertising companies. They have no qualms about smuggling software into your system, recording information and spying on everything you do. Adverts that change the start page of your browser also belong in the Spyware/Adware category. a-squared Free completely removes Spyware from your PC. Traces of Spyware in the Registry and Tracking Cookies are also recognized.

  • Worms, Bots, Viruses
    Worm viruses are currently one of the most irritating phenomena on the Internet. Usually transmitted as dangerous email attachments, worms send copies of themselves to all reachable destinations and cause great damage. Newer network worms/bots use security holes (Exploits) to infect a PC, and can reproduce at an astonishing speed. Without your knowledge, your PC is essentially transformed into a spam-sending zombie! a-squared Free eliminates worms from your PC and prevents them from doing any further damage.

  • Dialers
    Dialers are small programs that change the Internet access number of a modem-equipped computer to a much more expensive number. Costs can rise as high as several hundred dollars per dial attempt. a-squared Free detects Dialers with special Dialer Heuristics.
System requirements

a-squared Free runs on Windows XP, Vista, 7 as well as on 2003/2008 Servers in all 32 bit and 64 bit editions.

During scan are approx. 100 MB free RAM required. We suggest to use it on computers with at least 512 MB RAM, best would be 1 GB RAM.

Unlike other malware scanner products, a-squared Free was designed to run parallel with other antivirus and firewall software without troubles.

Free Comodo AntiVirus from Comodo Security solutions, Inc.

Comodo’s free antivirus might be considered as a valid replacement for security commercial products. It comes with a number of attractive features not normally seen in a free product, allowing you to get rid your computer of viruses, malware, Trojans, worms, hackers, and other Internet threats fast and easily.

Features of this anti virus software include:

- Individual computer and network protection – yes, despite it's being free, Comodo AV can be used in a network environment to protect servers and client PCs, as well as being able to scan across network drives and folders.
- On Access Scanning – Real-time protection against virus infection.
- On Demand Scanning – Check a file, disk or folder for possible infection before use.
- HIPS Protection – Host Intrusion Prevention System enables users to prevent and stop malicious spyware and malware from being installed or executed.
- Removable Device Scanning – Check through all known sources of infection from add-in peripherals such as CDs, DVDs, USB Sticks and even your cell phone.
- Incremental Scanning – Allows faster scans by ignoring files and folders marked as ‘safe.’
- Heuristic Detection – Identifies unknown viruses by analyzing behavior patterns of software code.
- Process Monitoring – Continually scans memory resident applications and processes.
- Email Scanning – Scans both incoming and outgoing email and attachments.
- Worm Blocker - protection against worm programs that attempt to duplicate themselves by sending mass mailings to your contact list.
- Compressed File Scans – Can scan within compressed file formats such as .RAR and .ZIP.
- Daily Updates – Automated daily updates of the virus signature database.
- Unique "slider" to easily change your current security level – You can change the behavior of AntiVirus to reflect your security preferences at any given time
- Quarantine Files – Quarantine suspicious files so they cannot run.
- Safe List – Create a customized safe list of programs and files installed to speed up scans.
- Full Reports – Comprehensive logs and results of all anti-virus scans performed.
- Scan Scheduling – Choose when to update your virus definitions and antivirus scans.
- File Submission – Submit suspicious files to Comodo Labs for analysis.
- Easy to use and user-friendly interface.

System Requirements:

- WinXP or Windows Vista Home Premium or Windows 7.0
- 64 MB RAM / 70 MB hard disk space

Download the latest software version of the product from manufacturer Website:
http://download.comodo.com/cis/download/setups/CIS_Setup_3.13.121240.574_XP_Vista_x32.exe

Spybot - S&D (Search and Destroy) spyware detection and removal tool

Spybot - S&D (Search and Destroy) is an adware and spyware detection and removal tool. This includes removal of certain advertising components, which may gather statistics as well as detection of various keylogging and other spy utilities. In addition, it also securely removes PC and Internet usage tracks, including browser history, temporary pages, cookies (with option to keep selected) and more.


The program offers an attractive outlook-style interface that is easy to use and multi-lingual. Spybot - S&D allows you to exclude selected cookies, programs or extensions from being reported, allowing you to prevent false positive messages for items that you don’t want to be alerted of every time. It can even scan your download directory for files that have been downloaded, but not yet installed, allowing you to detect unwanted programs before you even install them.

SpyBot produces a detailed and easy to understand report before it deletes any files and allows you to deselect any item that you do not want to be processed. In addition, a recovery feature allows you to restore your settings if needed.

Note that even if you don't see the symptoms, your computer may be infected, because more and more spyware is emerging.

Spybot-S&D can start in two modes: Easy mode for new users who want just the basic features, and Advanced mode for professional users and those who want more control. Both modes are available in the free version.

Main features in default mode:

- Removal of adware and spyware.
- Removal of dialers.
- Removal of keyloggers.
- Removal of trojans.
- Removal of usage tracks.
- User-extendable database.
- Save removal of threats by shredding them.
- Backups of every removed problem.
- Permanent blocking of threatening ActiveX downloads.
- Permanent blocking of known tracking cookies for IE.
- Permanent blocking of threating downloads in IE.
- Command line parameters to automate tasks.
- Detailed information about problems found.
- Strict criteria to define targets.
- Integrated update function.
- Weekly updates.
- Update notification by mail.
- Easy to use interface.
- Multi-language support.

The efficiency of the utility is moderate, as any other similar freeware anti-malware programs. It should be used in conjunction with several other utilities to reach sterile cleanness on your computer.

Access program website for reviewing additional information and utility downloading: http://www.safer-networking.org/en/spybotsd/index.html.

All-in-One Free Portable Viruses, Trojans, and Rootkits Remover - Dr. Web CureIt!

Overview


Dr. Web CureIt is a standalone anti-virus and anti-spyware scanner that scans your PC for viruses, trojans, adware, spyware, hack tools, rootkits, and other malware. The program does not require an installation and can be run from a USB drive. This is an on-demand scanner only, it can detect and remove virus infections but does not provide any real-time protection. Dr.Web CureIt is based on the ICSA certified Dr. Web scanning engine and should provide reliable detection.

Pros: Free; No installation needed; scans for a wide range of viruses.

Cons: No real-time protection; updates require re-download of the entire program.

Dr.Web CureIt! detects and removes

* Rootkits * Mass-mailing worms * E-mail viruses * Peer-to-peer viruses * Internet worms * File viruses * Trojans * Stealth viruses* Polymorphic viruses * Bodiless viruses * Macro viruses * MS Office viruses * Script viruses * Spyware * Spybots * Password stealers * Keyloggers* Paid Dialers * Adware * Riskware* Hacktools * Backdoors * Joke programs * Malicious scripts * Other malware*

How do I use Dr.Web CureIt!?

Download Dr.Web CureIt! from provided link. Run the utility and press the "Start" button in the opened window. Confirm the launch by pressing the "OK" button and wait for the scanning results of the main memory and startup files. If you want to scan all or just some drives of a computer, select the Complete scan or the Custom scan mode (in the latter case, select the necessary objects you want to scan) and press the "Start scanning" button on the scanner right.

When you call the utility, you can specify parameters for the scanner in the command line, i.e. to specify the objects for scanning or/and modify the scanning modes different from the default ones.

When being scanned, infected files are cured, incurable files are moved to the quarantine directory. When the scanning is finished, the log file and the quarantine are not deleted.

OS: MS Windows 95OSR2/ 98/Me/NT 4.0/2000/XP/2003/2008/Vista/7.

Languages: Dr.Web CureIt! automatically detects the language of the OS it is installed to and sets the scanner interface accordingly (if the local language is not supported, English is enabled). The utility supports the following 37 languages: Russian, Arabic, Armenian, Azeri, Belarusian, Bulgarian, Chinese (Simpl.), Chinese (Trad.), Czech, Dutch, English, Esperanto, Estonian, Finnish, French, Georgian, German, Greek, Hungarian, Italian, Japanese, Korean, Latvian, Lithuanian, Norwegian, Persian (Farsi), Polish, Portuguese, Serbian, Slovak, Slovenian, Spanish, Thai, Turkish, Ukrainian, Uzbek, Vietnamese.

Updates

This utility can quickly clean an infected system, but it is not a permanent tool to cure your computer in case of infection. Its distribution on our web-site is always armed with the hottest add-ons to the Dr.Web virus database, but it does not include the Dr.Web Automatic Updating utility. Dr.Web CureIt! stays actual until the next release of the add-on. To scan your computer with the most up-to-date Dr.Web virus databases next time you should download new Dr.Web CureIt! package.

More information and Download from Developers Website: http://www.freedrweb.com/

Data Recovery Techniques © 2008. Template by Dicas Blogger.

TOPO