StyleZ.BLOG @ Republic Polytechnic

October 29, 2006

Protection for your Computer!

Filed under: Daily stuff,Every Little Thing — Jasper Mah @ 1:18 pm

Hey all, StyleZ here. This week has indeed been quite tiring for me, been sorting out quite alot of stuff, and with work related to events for Gaming.RP. Now today, I have the idea on venturing to a guide of using different programs that can be used for protecting your computer, or self-maintenance against threats like

– viruses

– adwares

– spywares

– malwares

– trojans

Recently, I’ve been fixing people’s computers, and I noticed students do install some of the programs I am going to recommend later, but still, I have friends and accquaintances asking me for recommended softwares to counter such problems. So in today’s guide, I shall recommend some softwares, and if possible to take some screenshots to display how to use the softwares.

Note : Softwares, whether it’s a freeware, or a paid software, do not have protections that are forever, your current product’s protection power will not last throughout to defend against all threats for centuries. Threats are created almost everyday, and softwares constantly update itself to fight against such threats. Take in mind, Protection Softwares need to be constantly updated, whether is it the definitions, the software versions itself, updates are important to protection softwares!

Without further ado, I shall start my guide now!

Adwares are harmful programs that causes different effects, especially targeting your Internet Explorer. The function of adwares are to create popups constantly, that may contain tracking cookies, randomly at any time interval as and when they wished, while a person is surfing the Internet. Tracking cookies may be dangerous, and can reveal confidential information if a person’s cookies are being hijacked by other users. Now, cookies here don’t refer to those you eat, it’s a method used to keep your information while visiting different websites, such as your login information, your password, and credentials. Adwares may also attract trojan downloaders to appear on your computer, and cause more problems such as spywares, viruses to appear on your computer.

Well-Known Adwares:

– Gator

– NewDotNet

– CoolWebSearch

– Alexa Toolbar

Now spywares are extremely close brothers to adwares, and also can be quite damaging. So what are spywares? Spywares are harmful programs that may install loopholes within your operating system, allowing the program user to reveal information easily to the spyware creator, by having spying programs silently installed in the background, to monitor things such as keystrokes, websites visited, login information used. Spywares differs from worms and viruses because of it’s inability to replicate itself but still, contains its damages. Spywares can also force-download viruses and trojans to your computer at any point of time interval, so it can be one of the reasons why computers get easily infected, when even a small spyware is installed on the computer.

Well-known Spywares:

-180 Solutions


-Internet Optimizer(DyFuCa)




Now malwares are what we normally refered to as the “promotion package”, reason being that it contains both adwares and spywares, and is the most damaging out of the 3, in terms of affecting the Internet Explorer, and the Winsock, which is controlling your connection to the Internet. Malwares normally have difficult methods of removal, compared to spywares/adwares, which may have programs that can easily detect and remove the signatures of those adwares and spywares. Malwares’s alternative mostly require manual removal, and the editing of the registry. Malwares also have lack of alternatives to fixing the problem, as it can self-replicate without stopping, running on an infinite loop, so you may take forever to remove it, if you are self-dependent on programs.

Well Known malwares :

– CnsMin.dll


– Henbang Shanghai Technology

– Yahoo!Assistant China


Viruses are self-replicating computer program written to alter the way a computer operates, without the permission or knowledge of the user. Though the term is commonly used to refer to a range of malware, a true virus must replicate itself, and must execute itself. The latter criteria is often met by a virus which replaces existing executable files with a virus-infected copy. While viruses can be intentionally destructive—destroying data, some are known to be annoying malwares and irritates the users.

Well-known viruses:



– Hare

– Melissa worm

– RavMonE.exe

Trojan Horses

In the context of computer software, a Trojan horse is a malicious program that is disguised as or embedded within legitimate software. RavmonE.exe is an example of a trojan, which we classified as a trojan.downloader, where it downloads malware and viruses onto your computer.
There are two common types of Trojan horses. One, is otherwise useful software that has been corrupted by a cracker inserting malicious code that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer to peer file sharing utilities. The other type is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into some misdirected complicity that is needed to carry out the program’s objectives.

Trojan horse programs cannot operate autonomously, in contrast to some other types of malware, like viruses or worms. Just as the Greeks needed the Trojans to bring the horse inside for their plan to work, Trojan horse programs depend on actions by the intended victims. As such, if trojans replicate and even distribute themselves, each new victim must run the program/trojan. Therefore their virulence is of a different nature, depending on successful implementation of social engineering concepts rather than flaws in a computer system’s security design or configuration.

Adware Removal/Recommended Programs

Ad-Aware Personal/Professional Edition v1.06

To download Ad-Aware Personal Edition, for RP students, you can download it @,%20Spyware,%20Adware%20and%20Malware/aawsepersonal.exe

Spyware Removal/Recommended Programs

SpyBot Search & Destroy 1.4

Spyware Doctor (Approach IT-helpdesk for a licensed version or choose product registration to use full features)
Malwares Removal/Recommended Programs


Note : Autoruns requires some experience in identifying the programs, just in case you may delete the wrong file, I will release a small guide to using Autoruns soon!


StartupList (Works in a similar way as Autoruns)

Viruses Removal/Recommended Programs

AVG Free Edition

AntiVir Personal Edition

Trojans Removal / Recommended Programs

The Cleaner Professional

These are all the softwares I would recommend for your PC protection, maintenance and removal of harmful issues. Please remember to constantly update the softwares and do constant scanning weekly for recommended results!

Like PBL, you have to learn how to use Google to search for information on a certain program if you think that it’s a spyware. Find conclusive information before performing any actions on it!

Like usual, if you know me personally, or would like to get into contact with me for any maintenance issues or advices in removal :

Contact me @

or leave your email address here with the problem you encountered, in the comments section, so I can get back to you ASAP.

Thank You.

– StyleZ

“Play with Originality, Play with StyleZ”



  1. LOLS… when did i ever had a guide book friend and i do not know abt it hahas… simple guide.. BUT, i wouldnt recommend AVG, it not very comprehensive but i go for mcafee instead. hahas.. just my oponion nia.. cheers, cya ard. =)

    Comment by kAi — November 9, 2006 @ 10:28 am | Reply

  2. I’m a Kaspersky man myself. Good read and info though.
    Davin Ogden

    Comment by Davin Ogden aka The Davinator — February 2, 2007 @ 8:33 am | Reply

RSS feed for comments on this post. TrackBack URI

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

Create a free website or blog at

%d bloggers like this: