Where Does Spam Come From?

Spam impacts everyone in one way or another. Have you ever found yourself wondering where does spam actually come from? Where in the world does spam originate prior to clogging up your email Inbox or your computer?

I recently came across interesting spam information from ICSA Labs, an independent testing organization that produces a weekly report on the Top 10 Countries Sending Spam. Their reports list the countries where spam originates during a given week and how the volume of spam from each country varies over time.

Top Countries Where Spam Comes From

The ICSA Labs table below shows India, Russia, Brazil and the United States the top four countries where spam originated during the weeks of August 9-15, 2010 and August 16-22, 2010. These four countries accounted for approximately 35% – 37% of all spam that ICSA Labs tracked, indicating that spam generation is fairly dispersed geographically. The top ten countries in these lists account for less than 60% of all spam sent.

Spam Origins Over Time

Another chart from ICSA Labs shows takes the weekly spam data from January 2010 through August 2010 and illustrates the fluctuations in where spam comes from over a longer period of time. While Ukraine and South Korea have remained relatively consistent as sources for the origination of spam, the volume of spam coming from Brazil, Russia, India and the Unites States has varied much more dramatically.

In the end, this information doesn’t necessarily decrease your volume of spam or make you any more protected against spam. However it does provide some perspective on the global nature of spam and the importance of having technology in place to block and filter spam to minimize the problems it can cause. Plus now you will be better able to answer the question of “where does spam come from.”

You can find additional spam reports and information at ICSA Labs .


Source:- www.htstechtips.com

Remove W32/Virut Virus from Computer

W32/Virut is a polymorphic virus that infects executables and screensaver files, and attempts to downloads additional malware. The Virut.CM variant also injects an iframe object into HTML based files, disables Windows file protection in order to infect essential protected Windows system files. A viral thread, running under winlogon.exe or services.exe, attempts to connect to an IRC backdoor through port 80 or 65520, in order to download additional malware components.

Virut infects executable files as they are accessed, by either subverting a call through the IAT (import address table) in the original host code to jump to itself, or completely replacing the entry point of the executable file to point to itself. Because executable files are infected in this way, files on network drives accessed from an infected computer may also be infected.

Due to the aggressive nature of this malware, some infected files may become corrupted, to the point where they are not possible to repair or clean. In such cases certain files might have to be restored from a backup. Install best antivirus program that suites PC for removing this virus.

Get Rid of Spycheck Anti-Spyware 2010 Rogue Antispyware

Spycheck Anti-Spyware 2010 is not a legitimate and Real Antispyware Program but itself a spyware, more precisely a new kind of rogue antispyware program from the same family of Antivirus Live. When Spycheck Anti-Spyware 2010 is started, it will imitate a system scan and detect a lot of various infections that will not be fixed unless you first purchase the program. All of these infections are fake and don’t actually exist on your computer. So you can safely ignore the scan results.

Remove Spycheck Anti-Spyware 2010

Though some anti-Malware programs like MalwareBytes claim to delete this malicious fake anti-spywares, they cannot correct all the damages it causes. So you need something to fix all the damages that were left behind, to delete all the traces completely, to revive your PC from malicious trojans that may still reside and make your PC slow and to stop from getting re-infected.

Reimage is the only repair tool that fixes damaged system files, whereas other regular anti-malware and anti-spyware just deletes the rogues they don’t fix the damage left behind.

1. Start your PC in safe mode with networking, If you can`t run the IE, then you should repair the proxy settings of Internet Explorer.
2. Run Internet Explorer, Click Tools -> Internet Options. Select Connections Tab and click to Lan Settings button.
3. Uncheck “Use a proxy server” box. Click OK. Click Apply. Click OK.

Visit “http://reimagepcrepair.com” to run a Scan.

Reimage detects and terminates all Adware, Spyware, Trojans, Key-loggers, Identity Theft scripts, Hijackers, Tracking Threats, Rogue Anti-Spyware.

Instantly Remove McAfee Products from Windows without Formatting

Since the advent of various computer programs and software, the concept of malware or viruses has become perhaps the prime concern of programmers and users as a whole, be it at home or any enterprise. Software designers have designed a number of various highly efficient anti-viruses, which are more like vaccines, to prevent virus attacks and other malware functions to a system.

Issues while uninstalling McAfee Products:
However, there is one major drawback of using McAfee products. A user faces problems in completely removing McAfee products if he has to uninstall one. Uninstalling the program from “Add or Remove Programs” in the Control Panel, or deleting the installed files from the directory location does not remove McAfee products completely. This hinders the future installation of similar programs when the user opts to install a new one. The system indicates that the previous McAfee product is still installed and it’s unable to carry out the installation of a similar new program.

Removing process:
McAfee itself provides a solution to this problem. The McAfee Consumer Products Removal (MCPR) Tool, launched by McAfee completely uninstalls any McAfee product installed in the system. This tool is a simple “.exe” file, which on installation searches for any installed McAfee products on your system.

The procedure for completely removing a McAfee product is described below:
1. Download McAfee Consumer Products Removal (MCPR) Tool.
2. Press the downloaded file to install it to your system. Windows Vista users need to right click on the downloaded file and then select to “Run as Administrator”. Confirm any messages appearing to continue.
3. Once installed, the MCPR takes charge of its process of removing the McAfee products installed in your system.
4. When all the McAfee products are removed completely, i.e., the removal process is finished, a message declaring “Cleaning Successful” appears. Restart your system to finish removing McAfee products completely from your system.

Google act to fix YouTube flaw being exploited

YouTube has been enforced to fix a flaws that allows hackers to bombard its users with fake pop-up add and alerts and redirect them to retricted sites. Hackers use to place code in the comments section, and when some plays that video the script automatically runs. In some cases, a pop-up screen appears, showing some latest news (Fake most of the time).

Google, which owns YouTube, asked it to fix problem at the arlest, "about two hours" after it was discovered. YouTube spokeperson said that, "We took swift action to fix a cross-site scripting (XSS) vulnerability on youtube.com".

Hackers hide those comments within in an hour as soon as they get this news.

Hackers use Cross-site scripting (XSS) vulnerabilities, they are relatively easy attacks that allows them to place code into website pages. In this YouTube incident, hackers use JavaScript and HTML code, both commonly used on web pages.

Internet Security experts claims that although in most these attacks code was relatively not much dangerous, it has been used for more malicious purposes. "It could be used to show a message like “update your password”, this further could link to a malicious website.

How to Protect Facebook Account From Hackers

Facebook is undoubtedly one among the most popular social networking services in the world. Millions of people around the world use Facebook to connect to their friends, family and also to make new friends. But, knowingly or unknowingly users give out a lot of information about themselves on Facebook. Protecting your personal information on social networking sites is extremely important, as it is not only a matter of privacy but also an important step in preventing identity theft.

Facebook has been experiencing a lot of issues regarding the privacy and security of it’s users. However, a lot of changes have been made to the privacy controls thereby making it easy for the users to control every information they share with the world.

Facebook’s Privacy Options:
In order to protect your Facebook account it is necessary you change these settings.
1. On your Facebook homepage, click on Account (at the top-right) and select Privacy Settings from the drop-down menu.
2. The Privacy Settings page will open. Here you can customize the information you share on Facebook. If you do not know what settings to use, it is better you select the Recommended mode.
3. If you are using the Custom mode, it is important you know what information should be shared and what not. To use custom settings, click on Custom mode on the left and then select Customize settings.

Speed up Windows 7 on Computer

Windows 7 based computer is undoubtedly most powerful operating system for today. It is really a massive improvement over Windows Vista. But with this powerful operating system become prone to start running sluggishly, developing errors and so much more. This is the major problem which even the most advanced computer system cannot escape. To fix this issue you should have a program tool that can resolve Windows 7 slow issues.

You should know that there is a section in all Windows based computer called registry. This part is the one of the most common culprits to start running slower. The reason behind this is that the registry is prone to develop corrupt files, missing files and receives a virus. Most of the programs are now available online which are specially designed to repair the registry file of Windows PC and make your PC much faster and optimized.

Some other reasons are also become the cause of your slow Windows7 such as virus, too much unused files etc. After repairing Windows 7 the speed of your system may increase. But this is not a fix solution of your problem. In order to resolve such issue from the root you need software that can speed up your system without performing any bulky task.

PC speed Maximizer is one of the best options to speed up Windows 7. This software allows you to optimize your PC in easy steps. It is specially designed to maximize the PC speed. It uses some powerful application to perform its automatic task.

Features:
1. It automatically optimizes your registry settings to prevent crashes and speed up your computer.
2. It removes privacy and temporary files to protect your privacy.
3. It automatically delete junk file to free disk space and improve performance.
4. Removes unnecessary programs from starting with windows to increase the speed of starting windows and free up memory and improve performance.

New features in Microsoft Excel 2010


Microsoft Office Excel 2010 is available with many new features and improvements for all types of users. Microsoft has rewritten almost all old functions to improve performance and accuracy in Excel. Excel 2010 is definitely improved in performance and has reduced graphics clutter when compared to Excel 2007.

Features in Microsoft Excel 2010:

1. Improved Ribbon: Microsoft introduced ribbon in Office 2007 but it is included in the list of new features because it has come a long way. The ribbon in Office 2010 is an enhanced, cleaner and more customizable tool. It is easier to change the behavior of the ribbon including adding your own shortcuts and hiding it if you don’t need to use the ribbon.

2. Paste option: Microsoft has also introduced a new paste option. This option will display when you right click to paste. The paste option will change depending on what you are doing, So you might see different options when you past a picture than you would if pasting text.

3. Sparklines: Sparklines is one of most exciting features of Excel 2010. Sparklines are tiny charts that appear within a single spreadsheet cell. Basically Sparklines are a visual way to display numbers. Sparklines help bring meaning and context to numbers being reported and, unlike a chart, are meant to be embedded into what they are describing.

4. Slicer: Slicer is another new feature on Excel 2010 which helps to filter the data in pivot tables. Pivot tables are used to summarize the data and with the introduction of Slicers, you can visually filter the data on pivot table and quickly find the data you are looking for. You can use Slicers anywhere you want in the excel sheet and you don’t need to move the pivot tables to do that.

5. Protected view: like Word 2010, Excel 2010 features protected view. If you open any downloaded file from the internet or an old version of Office, you won’t be able to edit the file right away. This is because Excel 2010 opens such files in protected mode, and by default editing is disabled to prevent a virus or malicious code from running. If you know where the file came from and trust it then you can enable editing with one click.

Rogue Facebook Applications


The latest threat encircling Facebook is a rogue application dubbed "Distracting Beach Babes." The application compromised the security of thousands of users' accounts by way of status messages that appear to be from friends but when the users click through on the link, they're asked to give an application permission to run. The app then tells users they must update their "FLV player" before they can see the video. Those who attempt to do so are redirected to another page where malware is installed on their computer.
This is hardly the first rogue application to take advantage of Facebook's automated app approval systems. In fact, only days ago, a similar attack take place. This one was a link to what was purportedly the "sexiest video ever!".
This particular application led to a very busy weekend for anti-virus firms, indicating a major push by rogue Facebook apps. There anti-malware software blocked more than 30,000 rogue Facebook applications, more than three times the rate of rogue anti-spyware.
In other words, the new anti-malware wave won't be coming from email, IM or other random websites users are tricked into visiting. It will come from your Facebook friends.

Facebook Virus


Due to frequent attacks of viruses on social networking sites, Facebook has decided to increase its security level for its users. Facebook is trying not only to protect the privacy of its users but also wants to provide security against malicious threats, like viruses, spyware and spam.
The pressure on social networking sites to take action on the security front comes increasingly from parents who are concerned about their children’s online security. In the recent statement Facebook they will be creating a special support team that will provide guidance to parents on how to maintain security level for their child while they are using Face book.
However many technocrats are worried about hackers who sends unprecedented spam to more than 400 million registered users. Experts want Facebook to have more resistive security protocol measures in order keep a check on spammers.
Facebook claims that it has introduced new era of technology measures such as CAPTCHAs (Completely Automated Public Turing tests to tell Computers and Humans Apart), which is an automated computer application that runs on the server. If the application detects that a particular users is sending message in an erroneous manners, it will instantaneously block that user.
Follow following steps to remove Facebook virus.
STEP 1: Terminate the following processes:
fbtre6.exe
mstre6.exe
STEP 2: Delete the below mentioned registry values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Run\"systray" = "c:\windows\mstre6.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Run\"systray" = "C:\Windows\fbtre6.exe"
HKEY_CURRENT_USER\AppEvents\Schemes\Apps\Explorer\Navigating
STEP 3: After deleting the registry entries, delete these files:
C:\\Windows\\fbtre6.exe
C:\\Windows\\fmark2.dat

Online McAfee Antivirus Support

Enjoy comprehensive tech support for your McAfee products by calling iYogi’s toll free phone number 1-800-237-3901.

Get unlimited support for all McAfee products and software with the assistance of expert technicians at iYogi and ensure the health and security of your PC from all kinds of viruses and online security threats.

Call iYogi at our toll free phone number and get connected to our tech experts for comprehensive McAfee support. We are available 24/7 all around the year.

Our Microsoft Certified technicians will take your calls 24/7/365 and ensure that all aspects of McAfee support are met and executed with absolute precision and accuracy. We have wide scope of services for McAfee products and software for the most effective protection of your PC from viruses, malware and other malicious programs including online and networking threats.

Call now at our toll free phone number for yearlong McAfee support. We are available anytime, anywhere.

Features
Here’s what you get with our award winning service:
• Get comprehensive McAfee support at a nominal price of $139.99 per year, and ensure your PC’s health and security.
• Our services are remotely enabled through the Internet or over a phone call.
• Our tech experts are available 24/7/ 365 anytime, anywhere.
• Our highly skilled Microsoft Certified technicians have been selected from the best in the industry to provide the best services.
• iYogi’s customer satisfaction is not only the highest at 95% but also award winning.

Scope of Service
Under our unlimited McAfee support plan, you will also be entitled to our other services which include:
• Diagnostic & repair of your hardware issues
• Troubleshoot software errors
• Update drivers and security to protect against online threats
• Connect to the Internet, devices and peripherals
• Optimize your PC’s speed and performance

At iYogi, we support all McAfee products and software, including McAfee Antivirus Plus, McAfee Internet Security, McAfee Firewall, McAfee Online Backup, McAfee Family Protection, VirusScan, VirusScan Professional, McAfee Total Protection, McAfee QuickClean, McAfee Utilities, and much more.