All Questions
43
questions
1
vote
3
answers
2k
views
Do you recognise this suspicious folder: Malicious or Benign
Does anyone recognise this suspicious folder that sits on my C drive?
The folder sits on my C drive at C:\cacde6d0fd849a939328ab\ The name obviously looks like a hash/encryption/or junk text.
The ...
3
votes
2
answers
292
views
What does an AVG "False alarm" message mean?
My question is about the category of AVG alerts which contain the text "False alarm", such as the one that appears in this old forum thread: http://forums.avg.com/us-en/avg-forums?sec=thread&act=...
5
votes
1
answer
3k
views
Are live CD/DVDs more secure than live USB?
If you create a bootable live CD/DVD for an OS such as Linux or Windows, is that more secure than a live USB that does the same thing? What if the disk is a CD-R or DVD-R as opposed to a CD-RW or DVD-...
1
vote
2
answers
206
views
How can I harden my system against an infected website? [closed]
Let’s say that I have to go to a website, and I am 99% sure that it will attempt to put a virus on my computer somehow. What settings can I change in my browser, OS, etc. to make sure that I will be ...
1
vote
2
answers
783
views
How to fully uninstall Adobe Flash?
Unfortunately a game bundled Adobe Flash in its installer, thus it clawed its way onto my PC. I haven't been using Windows for a while (Used it for a long time but took a hiatus with another OS) so I ...
23
votes
4
answers
6k
views
What are ways to prevent files with the Right-to-Left Override (RLO) Unicode character in their filenames (malware spoofing method) from being run?
How the RLO unicode character is used by malware:
[...] This virus's file name is crafted in a way that PC users take it for a benign file from its appearance (mainly the file extension) and open it.
...
0
votes
1
answer
1k
views
Is dual-booting more secure than having a single operating system installed?
I need some advice. I've recently become wary about using one computer for everything I do, from a security perspective. I have antimalware installed, but I also download and run a lot of stuff I find ...
1
vote
3
answers
146
views
Can malware/intrusion attempt via browser, attack other computers on same local network? (Windows) (no shares setup)? [closed]
Can malware, if running within a plug-in or elsewhere within the browser, or if downloaded and executed, or within a site that attempts intrusion, attack other machines on the local network, even if ...
2
votes
2
answers
126
views
Is it possible to install software in such a way that the user can't remove it?
Let's say a program is contained entirely in a jar or exe. Is it possible for this program to propagate itself such that the user can't possibly remove it from the machine? I'm wondering how much ...
3
votes
4
answers
4k
views
Trusteer Rapport "security software" says my computer is infected
I'm sure I'm not the first person to come across this, but here in the UK it seems every major bank (e.g. HSBC, NatWest, etc.) are getting their customers to install Trusteer's Rapport software before ...
3
votes
6
answers
1k
views
How did my computer get compromised?
How is it possible that my up to date install of Windows 7 with UAC enabled and Microsoft Security Essentials running became compromised, seemingly in a website drive-by?
I've run ostensibly the same ...
4
votes
18
answers
1k
views
Is free security software as good as paid security software? [closed]
I mostly use free security solutions to protect my home PC, but I wonder if I would get better protection from a paid solution.
I prefer the free software, since I can have multiple applications ...
103
votes
23
answers
17k
views
How can I make a Windows PC bullet-proof for home users? [closed]
I realize that virus-proof on a Windows PC is far fetched, but in the interest of keeping time spent as the "family-tech-support" to a minimum, I am looking for ideas to lock a computer down to the ...