Thursday, June 25, 2009

BASE / ACID outdated reference links - a fix

Recently, with changes to the snort.org site, the Snort mailing lists have been quite inundated with questions about the link to the SID reference and how it is no more. As a partial means of compensating for this and to help the community, we have recently added an up-to-date tool at rootedyour.com that will allow for you to once again have a valid snort reference link.


In BASE, simply locate the following section of your base_conf.php:
/* Signature references */
$external_sig_link = array('bugtraq' => array('http://www.securityfocus.com/bid/', ''),
'snort' => array('http://www.snort.org/pub-bin/sigs.cgi?sid=', ''),
'cve' => array('http://cve.mitre.org/cgi-bin/cvename.cgi?name=', ''),
'arachnids' => array('http://www.whitehats.com/info/ids', ''),
'mcafee' => array('http://vil.nai.com/vil/content/v_', '.htm'),
'icat' => array('http://icat.nist.gov/icat.cfm?cvename=CAN-', ''),
'nessus' => array('http://www.nessus.org/plugins/index.php?view=single&id=', ''),
'url' => array('http://', ''),
'local' => array('signatures/', '.txt'));


and modify the 'snort' line to match:
'snort' => array('http://www.rootedyour.com/snortsid?sid=', ''),
Once this is done, you are all set, the snort documentation link will now take you to rootedyour.com and display the info for that SID.

Obviously if you want to do this in other applications, simply point them to http://www.rootedyour.com/snortsid?sid=xxxxx where xxxxx is the SID that you want to know about. ex: http://rootedyour.com/snortsid?sid=234

Cheers,
JJC

Tuesday, June 23, 2009

Fly Clear, Sensitive Data Disposal Concerns

Early today, the company that produces the Clear Pass announced via press release and on their website that they were shutting down operations effective at 23:00 on June 22.

Noted on their website:
Spokespeople at various Clear equipped airports said that qualified clear users would be allowed to pass through the "premium" lanes at said airports.

Of course, to me, this leaves a big question out there: WHAT IS GOING TO HAPPEN WITH THE BIOMETRIC DATA? I mean, these guys collected BIOMETRIC and more info (retinal scans, complete fingerprint sets, background information, credit information etc...) and what is going to happen to this data? Will it be sold off to the highest bidder, handed over to one of the many alphabet soup government agencies, placed into a dumpster by an angry employee or what? That is of course the only question that I have. If you were one of the many that signed up, you had the option to opt in or out of their program that shared the biometric information with the feds, but what now? My largest concern is of course the first and thirt item that I listed. What do you think?

Cheers,
JJC

Saturday, June 20, 2009

Remove Private-online-scan.com Browser Hijacker

Private-online-scan.com is a website to which many Internet misleading links and ad banners lead. Surfing the web user may be easily trapped and brought to this website.
Do not trust Private-online-scan.com statements that your PC is infected and solution needed to remove the infections. However, your can be infected, but do you need another infection? That is, Private-online-scan.com delivers malware. If you have made an installation from this website, you are for sure infected and need to remove Private-online-scan.com spyware. In addition, there is a hijacker that forces your browser to download Private-online-scan.com. This hijacker is a trojan. It is strongly advised to remove Malware-cather.com trojan and software as appropriate or else your computer system will be oppressed by malware. Click here to start the removal of Private-online-scan.com infections.

Private-online-scan.com screenshot:


Private-online-scan.com removal tool:

Removal of Contraviro Malware

Remove Contraviro, because this is a program advertised by trojans in extremely annoying manner. Remove Contraviro related trojans at once. Contraviro is installed either manually by user from one of its websites or secretly with trojan of Vundo type. Probably, all ways of Contraviro infiltration into targeted machine are not known to us yet and there are likely to be other tricky ways of Contraviro shadowed installation. Contraviro pretends to scan computer for viruses and malware. In reality, though, it finds only files installed in one pack with its trialware or by related trojans. These files are neither hazardous nor useful. Scan by Contraviro, like any sort of rogue antispyware ads, ends with request to pay the registration fee.
Contraviro presence may also be revealed by fake security alerts stating that your computer is infected with SpamBot and similar scaring info.
Instead of buying malware, click here to scan computer for free and get rid of Contraviro scam.

Contraviro screenshots:


Contraviro removal tool (Spyware Doctor):

Contraviro manual removal instructions:
Delete Contraviro files:
Contraviro.exe
daily.cvd
Drvfltip.sys
hjengine.dll
IEAddon.dll
main.cvd
MFC71.dll
MFC71ENU.DLL
msvcp71.dll
msvcr71.dll
pthreadVC2.dll
shellext.dll
siglsp.dll
uninstall.exe
Contraviro.lnk
How to Register Contraviro.lnk
Register Contraviro.lnk

Delete Contraviro registry entries:
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\antivirus_contextscan
HKEY_CLASSES_ROOT\AppID\{C0E56AC2-9F72-436E-B6E7-AEC28AF9E4EB}
HKEY_CLASSES_ROOT\AppID\IEAddon.DLL
HKEY_CLASSES_ROOT\CLSID\{08EEC6AD-7486-487F-89B7-5A3716DDAE14}
HKEY_CLASSES_ROOT\CLSID\{CCB5551D-8594-4999-85F9-1E3EABCB95AC}
HKEY_CLASSES_ROOT\Drive\shellex\ContextMenuHandlers\antivirus_contextscan
HKEY_CLASSES_ROOT\Drives\shellex\ContextMenuHandlers\antivirus_contextscan
HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers\antivirus_contextscan
HKEY_CLASSES_ROOT\Interface\{5B184B9D-B7BD-4FEA-8D1F-5E27182206A5}
HKEY_CLASSES_ROOT\TypeLib\{3ED0E410-5C8E-47B6-A75D-D10B886E903C}
HKEY_LOCAL_MACHINE\SOFTWARE\Contraviro
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Explorer\Browser Helper Objects\{CCB5551D-8594-4999-85F9-1E3EABCB95AC}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Uninstall\Contraviro
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\
Winlogon "Shell"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Internet Settings\User Agent\Post Platform "Contraviro"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Run "Contraviro"

Thursday, June 18, 2009

Virus Remover Professional (Virus Remover Pro) Removal Instructions

Virus Remover Professional (Virus Remover Pro) is available for download at its website. The most popular way of this rogue infiltration into the computer system is to mislead user into installing Virus Remover Professional trialware from the above website. There are trojans of extremely small size which quite easily infect a number of computers connected to the Internet. These trojans are installed to hijack web-browser and to generate fake security alerts. The hijacked web-browser and fake alerts are connected to the home-page of Virus Remover Professional. The design of hackers is that users are redirected to the above web-page, download and install trialware which then bother and frighten them into buying Virus Remover Professional rogue antispyware.
Remove Virus Remover Professional trojans to return your browser in your exclusive disposal and avoid trialware installation. Get rid of Virus Remover Professional trialware to stop its annoying eds. Click here to start free scan and perform Virus Remover Professional removal.

Virus Remover Professional screenshots:


Virus Remover Professional removal tool:

Virus Remover Professional manual removal guide:
Delete Virus Remover Professional files:
Order Full Version NOW!.lnk
Virus Remover Professional.lnk
Visit Virus Remover Professional Homepage.lnk
LastSun Ltd
virusremover.exe
Virus Remover Professional.lnk
Virus Remover Pro..lnk
hp.url
license.rtf
order.url
unins000.dat
unins000.exe
virusremover.exe

Delete Virus Remover Professional registry entries:
HKEY_CURRENT_USER\Software\LastSun Ltd.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Uninstall\Virus Remover Professional_is1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Run “Virus Remover Profesional”

Wednesday, June 17, 2009

Antivir-scann-64bit.com is a key-element of rogue antispyware promotion

Antivir-scann-64bit.com delivers rogue antispyware and is sponsored buy trojan of extremely small size that hijacks web-browser. The website states your computer is infected with viruses and lures you into buying bogus solution that slows computer down and produces noisy alerts instead of curing the computer.Remove Antivir-scann-64bit.com hijacker to free your browser and browse Internet without watching annoying ads. Click here to run free scan and perform the removal of Antivir-scann-64bit.com hijacker, as well as of related rogue antispyware, if applicable.

Antivir-scann-64bit.com screenshot:


Antivir-scann-64bit.com remover:



Tuesday, June 16, 2009

Malware Destructor 2009 removal explanation

Malware Destructor 2009 (MalwareDestructor 2009) misrepresents the security state of a computer system bombarding user with misleading security alerts and imaginary virus names listed among the results of fictitious scan. A swindle with Malware Destructor 2009 normally starts with popups appearing when user is surfing the web. These popups either redirect user to fake online scanner or contain the recommendation that user shall download Malware Destructor 2009 as the computer system concerned is probably infected. Malware Destructor 2009 is not a single and original malware but almost a clone of older releases, WinDefender and Virus Doctor. Do not trust its online ads and never download and install it. If you were unfortunate to install the malware, remove Malware Destructor 2009 to stop the endless flood of its misleading alerts. Click here for free scan and to get rid of Malware Destructor 2009 using Spyware Doctor with antivirus.

Malware Destructor 2009 screenshots:



Malware Destructor 2009 removal tool:


Malware Destructor 2009 manual removal guide:
Delete Malware Destructor 2009 files:
MalwareDestructor2009.exe
Malware Destructor 2009.lnk
Uninstall Malware Destructor 2009.lnk
dxbl.dll

Delete Malware Destructor 2009 registry entries:
HKEY_CURRENT_USER\Software\Malware Destructor 2009
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Uninstall\Malware Destructor 2009
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Malware Destructor 2009"

pulledpork included in Security Onion LiveCD

Today, Doug Burks (the creator of the Security Onion LiveCD) announced the release of the latest rev of this tool. Included in this tool are "you guessed it" pulledpork and a number of other useful tools to the sekuritah professional :-)

Read more here => http://securityonion.blogspot.com/2009/06/security-onion-livecd-20090613.html

I would like to extend a thanks to Doug for his work on this tool and the inclusion of pulledpork and the other tools. While I have not yet had the opportunity to download and try out this LiveCD, I will be doing so soon.

Cheers,
JJC

“Protection System Security Alert” explanation and removal

“Protection System Security Alert” is a part of advertisements used by hackers promoting Protection System fake antivirus. This alert states that remote computer is attacking your computer. Further on, the alert asks user if he or she wants Internet access to be blocked to prevent system infection.“Protection System Security Alert” contains block and allow buttons. However, no matter what button you click on you may be led via web-browser to the purchase form of System Security. Remove Protection System Security Alert in a due way. Avoid using popup blockers as they will not disable and remove Protection System malware. You need to get rid of Protection System malware completely or else it will keep on disordering your computer system and may delete important data.
Click here and start free scan to get rid of “Protection System Security Alert” using complex software rooting the computer infections out.

Protection System Security Alert screenshot:


Protection System Security Alert removal tool:

Monday, June 15, 2009

Powerantivirusscannerv2.com Hijacker Removal Instructions

Powerantivirusscannerv2.com is a typical Personal Antivirus homepage hijacker. It use scare tactic to force users onto downloading and buying rogue software. We strongly recommend to remove Powerantivirusscannerv2.com hijacker using Spyware Doctor with antivirus.

Powerantivirusscannerv2.com screenshot:


Powerantivirusscannerv2.com hijacker remover:

Friday, June 12, 2009

Fastpcscan3.com as a head-quarter of rogue security tools

Fastpcscan3.com is a point from which rogue antispware starts to attack. Anonymous reporters stated this website was infected, but closer inspection has not revealed any suspicious codes directly in the scripts of Fastpcscan3.com. However, there has been exposed browser hijacker sponsoring Fastpcscan3.com and similar websites advertising fake computer security tools, adult websites and online gambling. If you were a visitor to Fastpcscan3.com, check your computer for malware and viruses in order to reveal and remove Fastpcscan3.com hijacker if applicable or else make sure your computer is free of malware and viruses. In addition, if you were unlucky to somewhat trusted in misleading ads of Fastpcscan3.com and downloaded commercial the rogue computer security tool advertised, you still need to get rid of Fastpcscan3.com’s rogue software. Click here to launch free scan and perform the removal of Fastpcscan3.com infections as appropriate (using Spyware Doctor with antivirus).

Fastpcscan3.com screenshot:


Fastpcscan3.com hijacker remover:

Tiger Protector Plus removal

Tiger Protector Plus is now listed among the entries of reliable malware scanners as its relationship with notorious malware of WinPCDefender, WinPCAntivirus has been clearly established. Further tests on Tiger Protector Plus have proved its behavior consists of annoying and misleading activities only. The initial look was already enough to establish the lack of simplest scanner among its constituents. Hence Tiger Protector Plus belongs to the category of rogue antispyware that even do not include a scanner despite the promises given to find infections on the computer concerned. Instead of scan, a sort of movie is played in which viruses derived from the hackers’ dreams are listed. Remove Tiger Protector Plus to free system resource utilized by the fraudware to dupe you. Click here to get rid of Tiger Protector Plus using Spyware Doctor with antivirus.

Tiger Protector Plus screenshot:


Tiger Protector Plus removal tool:

Thursday, June 11, 2009

Trojan.win32.agent: removal tips

Trojan.win32.agent.azsy is extremely small size program code designed to promote Personal Antivirus rogue antispyware. The small size allows Trojan.win32.agent.azsy to slip into targeted computer system unnoticed without great effort. Despite the size of less than 1 Mb Trojan.win32.agent.azsy can produce alerts and pretend to scan computer system showing corresponding movie posed as a scan reflection. It interferes with web-browser and its activities may result in rogue antispyware invasion and slow computer problem unless you get rid of Trojan.win32.agent.azsy in a good time. Click here to launch free scan and remove Trojan.win32.agent.azsy.

Trojan.win32.agent Removal Tool (Spyware Doctor + Antivirus):

Wednesday, June 10, 2009

Removal of Antimalwareproonlinescanv3.com associated rogues

Antimalwareproonlinescanv3.com is a website changed at the regular basis to promote different fake computer security tools (like Personal Antivirus). However, hackers somehow managed to strike it off the Google list of dangerous websites. Avoid visiting Antimalwareproonlinescanv3.com or else it may drop infections into your computer or mislead you into installing rogue antispyware. Click here to start free scan in order to make sure there are no rogue programs at your computer or to remove Antimalwareproonlinescanv3.com related infections.

Antimalwareproonlinescanv3.com screenshot:

Antimalwareproonlinescanv3.com removal tool:

Friday, June 5, 2009

How to block robots.. before they hit robots.txt - ala: mod_security

As many of you know, robots (in their many forms) can be quite pesky when it comes to crawling your site, indexing things that you don't want indexed. Yes, there is the standard of putting a robots.txt in your webroot, but that is often not highly effective. This is due to a number of facts... the least of which is not that robots tend to be poorly written to begin with and thus simply ignore the robots.txt anyway.

This comes up because a friend of mine that runs a big e-com site recently asked me.. "J, how can I block everything from these robots, I simply don't want them crawling our site." My typical response to this was "you know that you will then block these search engines and keep them from indexing your site"... to whit "yes, none of our sales are organic, they all come from referring partners and affiliate programs".... That's all that I needed to know... as long as it doesn't break anything that they need heh.

After puting some thought into it, and deciding that there was no really easy way to do this on a firewall, I decided that the best way to do it was to create some mod_security rules that looked for known robots and returned a 404 whenever any such monster hit the site. This made the most sense because they are running an Apache reverse proxy in front of their web application servers with mod_security (and some other fun).

A quick search on the internet found the robotstxt.org site that contained a listing (http://www.robotstxt.org/db/all.txt) of quite a few common robots. Looking through this file, all that I really cared about was the robots-useragent value. As such, I quickly whipped up the following perl that automaticaly creates a file named modsecurity_crs_36_all_robots.conf. Simply place this file in the apt path (for me /usr/local/etc/apache/Includes/mod_security2/) and restart your apache... voila.. now only (for the most part) users can browse your webserver. I'll not get into other complex setups, but you could do this on a per directory level also, from your httpd.conf, and mimic robots.txt (except the robots can't ignore the 404 muahahaha).

#####################Begin Perl#######################
#!/usr/bin/perl

##
## Quick little routine to pull the user-agent string out of the
## all.txt file from the robots project, with the intention of creating
## regular expression block rules so that they can no longer crawl
## against the rules!
## Copyright JJ Cummings 2009
## cummingsj@gmail.com
##

use strict;
use warnings;
use File::Path;

my ($line,$orig);
my $c = 1000000;
my $file = "all.txt";
my $write = "modsecurity_crs_36_all_robots.conf";
open (DATA,"<$file");
my @lines = ;
close (DATA);

open (WRITE,">$write");
print WRITE "#\n#\tQuick list of known robots that are parsable via http://www.robotstxt.org/db/all.txt\n";
print WRITE "#\tgenerated by robots.pl written by JJ Cummings \n\n";
foreach $line(@lines){
if ($line=~/robot-useragent:/i){
$line=~s/robot-useragent://;
$line=~s/^\s+//;
$line=~s/\s+$//;
$orig=$line;
$line=~s/\//\\\//g;
#$line=~s/\s/\\ /g;
$line=~s/\./\\\./g;
$line=~s/\!/\\\!/g;
$line=~s/\?/\\\?/g;
$line=~s/\$/\\\$/g;
$line=~s/\+/\\\+/g;
$line=~s/\|/\\\|/g;
$line=~s/\{/\\\{/g;
$line=~s/\}/\\\}/g;
$line=~s/\(/\\\(/g;
$line=~s/\)/\\\)/g;
$line=~s/\*/\\\*/g;
$line=~s/X/\./g;
$line=lc($line);
chomp($line);
if (($line ne "") && ($line !~ "no") && ($line !~ /none/i)) {
$c++;
$orig=~s/'//g;
$orig=~s/`//g;
chomp($orig);
print WRITE "SecRule REQUEST_HEADERS:User-Agent \"$line\" \\\n";
print WRITE "\t\"phase:2,t:none,t:lowercase,deny,log,auditlog,status:404,msg:'Automated Web Crawler Block Activity',id:'$c',tag:'AUTOMATION/BOTS',severity:'2'\"\n";
}
}
}
close (WRITE);
$c=$c-1000000;
print "$c total robots\n";


#####################End Perl#######################

To use the above, you have to save the all.txt file to the same directory as the perl.. and of course have +w permissions so that the perl can create the apt new file. This is a pretty basic routine... I wrote it in about 5 minutes (with a few extra minutes for tweaking of the ruleset format output (displayed below). So please, feel free to modify / enhance / whatever to fit your own needs as best you deem. **yes, I did shrink it so that it would format correctly here**

#####################Begin Example Output#######################
SecRule REQUEST_HEADERS:User-Agent "abcdatos botlink\/1\.0\.2 \(test links\)" \
"phase:2,t:none,t:lowercase,deny,log,auditlog,status:404,msg:'Automated Web Crawler Block Activity',id:'1000001',tag:'AUTOMATION/BOTS',severity:'2'"
SecRule REQUEST_HEADERS:User-Agent "'ahoy\! the homepage finder'" \
"phase:2,t:none,t:lowercase,deny,log,auditlog,status:404,msg:'Automated Web Crawler Block Activity',id:'1000002',tag:'AUTOMATION/BOTS',severity:'2'"
SecRule REQUEST_HEADERS:User-Agent "alkalinebot" \
"phase:2,t:none,t:lowercase,deny,log,auditlog,status:404,msg:'Automated Web Crawler Block Activity',id:'1000003',tag:'AUTOMATION/BOTS',severity:'2'"
SecRule REQUEST_HEADERS:User-Agent "anthillv1\.1" \
"phase:2,t:none,t:lowercase,deny,log,auditlog,status:404,msg:'Automated Web Crawler Block Activity',id:'1000004',tag:'AUTOMATION/BOTS',severity:'2'"
SecRule REQUEST_HEADERS:User-Agent "appie\/1\.1" \
"phase:2,t:none,t:lowercase,deny,log,auditlog,status:404,msg:'Automated Web Crawler Block Activity',id:'1000005',tag:'AUTOMATION/BOTS',severity:'2'"

#####################End Example Output#######################

And that folks, is how you destroy robots that you don't like.. you can modify the error that returns to fit whatever suits you best.. 403, 404.....

Cheers,
JJC

Thursday, June 4, 2009

Removal of Antimalware-live-scanv3.com associated adware (hijacker and variable rogue antispyware)

Like many similar websites, Antimalware-live-scanv3.com is popularized by the hijacker. The hijacker comes as a trojan or installed via malicious scripts of cracked websites. Antimalware-live-scanv3.com is a part of rogue antispyware ads aimed to make users buy certain fake antispyware (Personal Antivirus). Remove Antimalware-live-scanv3.com hijacker and corresponding rogue antipyware. We do not name the application advertised at Antimalware-live-scanv3.com, because its name varies to prevent the exposure. However, the website name is constant and you are invited clicking here to start free scan and get rid of Antimalware-live-scanv3.com associated rogues using Spyware Doctor with antivirus.

Antimalware-live-scanv3.com screenshot:

Antimalware-live-scanv3.com removal tool:

Wednesday, June 3, 2009

pulledpork tarball

It's up... get it while it's hot -> http://code.google.com/p/pulledpork/downloads/list

Cheers,
JJC

Removal of WinBlueSoft brings your software back to life

WinBlueSoft main peculiarity is blocker.dll file which performs quite complex operations to get control over the software installed on the computer system infected. That is, WinBlueSoft allows you to use only the software it allows to run like Internet explorer.
“Warning!
Your're in danger!
Your computer is infected with Spyware!
All you do with computers is stored forever in your hard disk. When you visit sites, send emails... All your actions are logged. And it is impossible to remove them with standard tools. Your data is still available for forensics. “
The above is alert users can see while most programs they run are blocked. A number of similar alerts are accompanied with fake scan with listing of fake virus names and indicating imaginary path. Unblock your legit software and remove WinBlueSoft, i.e to get you software back you must get rid of WinBlueSoft. Click here to start free scan in order to expose infections devastating your computer system and perform WinBlueSoft removal (using Spyware Doctor with antivirus).

WinBlueSoft screenshot:



WinBlueSoft removal tool:

WinBlueSoft manual removal guide:
Delete WinBlueSoft files:

WinBlueSoft.lnk
2 Homepage.lnk
3 Uninstall.lnk
data.bin
license.txt
uninstall.exe
WinBlueSoft.exe
blocker.dll

Delete WinBlueSoft registry entries:
HKEY_CURRENT_USER\Software\WinBlueSoft
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Uninstall\WinBlueSoft
HKEY_LOCAL_MACHINE\SOFTWARE\WinBlueSoft
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Run “WinBlueSoft”

Tuesday, June 2, 2009

v0.2 Beta 1 is the outed! -> pulledpork that is <-



As the title indicates, the first beta for v0.2 of pulledpork has just been checked in to the pulledpork svn..

A shortlist of the current featuresets below



Release 0.1:

Release 0.2:

So, as you can see above I have added quite a bit of code and functionality to pulled pork. The disablesid function should be pretty robust (perhaps I'll add some additional error handling), but for the most part it should rock and roll!

I'll likely be adding a modifysid section to mirror what oinkmaster does with their modifysid function.. but that's probably still a few weeks out.

Having said all of this, please download, test and post any bugs/issues that you find on the google code page for pulledpork or catch me in #snort on freenode.

And now, the gratuatis screenshot ;-)


Cheers,
JJC

XP Deluxe Protector can damage your PC

XP Deluxe Protector is more than just another fake antispyware. The very first observations on XP Deluxe Protector exposed its sub-programs responsible for unauthorized System Registry management. Further research showed that XP Deluxe Protector removed System Registry entries encoding popular reliable software, first of all, and legit security tools. However, if the security software installed had a timely-updated and robust virus shield, it would inform users about dangerous components of XP Deluxe Protector or abort its hidden downloading and installation. Thus, XP Deluxe Protector may also be classified as a program-intruder that aims at taking control over host system. Presence of XP Deluxe Protector is easily detectable as it performs a process entitled XP Deluxe Protector scan each time user logs into Windows. However, the process is not an actual scan but in advance prepared show with predefined heaps of imaginary viruses listed regardless of real infection status of your computer. Remove XP Deluxe Protector and ignore the information hackers want to frighten you with into paying the registration fee. In order to get rid of XP Deluxe Protector including all the malware that could be bundled with it, click here and start automated XP Deluxe Protector removal (using Spyware Doctor with antivirus).

XP Deluxe Protector screenshot:


XP Deluxe Protector removal tool:

Presto TuneUp is to be removed as another fake system optimization tool

Presto TuneUp represents a category of fake system optimization tools. Very few software as compared to fake virus and spyware removers enter this category. However, many users ask how to remove Presto TuneUp so that Presto TuneUp is quite (un)popular to be briefly described. Presto TuneUp is often installed as trojan being disguised as codec or another utility. Once installed, the rogue shows user interactive window with rich menu. Naturally, any part of this menu does not represent working useful function. Removal of Presto TuneUp is problematic, because:
- the program is either missed in the register of programs installed,
- if present, its removal through that list does not actually remove Presto TuneUp.
Click here to start free scan and get rid of Presto TuneUp using reliable proved solution for fake programs removal. Presto TuneUp removal will root malware out once and for all.

Presto TuneUp screenshot:

Presto TuneUp removal tool:


Presto TuneUp manual removal guide: Delete Presto TuneUp files:
Autorun.ico
cookies.sqlite
places.sqlite
Process.ico
Service.ico
AutorunManager.lnk
Presto TuneUp.lnk
ProcessManager.lnk
ServiceManager.lnk
Presto TuneUp.lnk
Presto TuneUp.lnk
SystemBackup
345d567
mozcrt19.dll
PrestoTuneUp.exe
sqlite3.dll
working.log
backup.dat

Delete Presto TuneUp registry entries:
HKEY_CLASSES_ROOT\CLSID\{3F2BBC05-40DF-11D2-9455-00104BC936FF}
HKEY_CLASSES_ROOT\PrestoTuneUp.DocHostUIHandler
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Internet Settings\5.0\User Agent\Post Platform "URPRTUP[]"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Run "Presto TuneUp"

Monday, June 1, 2009

PulledPork Checkin

Quick update today with big enhancements coming this week in the bbq pulledpork arena! (hopefully).

This past Friday I checked in some code for PulledPork that allows for the handling of any format contents of md5 file from the snort.org servers.. we won't be foiled again ;-)

Get your great tasting pulledpork here => http://code.google.com/p/pulledpork

Cheers,
JJC