Skip to content

Think your infected? Did something try to tell you this?


Ok below is what happened sometime ago, yet it doesnot mean it has stopped today!!

More revelant for Feb –

Latest Security & News Info

Facebook has finnally changed their privacy policy the the general population is agreeable to.

Well Let me say this if this thing popped up anywhere on your computer, I would have good reason to think you are infected so follow the steps on this Page and then check to be sure on the Page given at the bottom of this page.
Updated today!  Also Many of you know That Anti-Spam software is not required for your system if your doing exactly what I hope to get done.

Does your computer tell you this, LOOK OUT!!

Does your computer tell you this, LOOK OUT!!

The executable that’s offered could be AV2009Install_77011807.exe There could be any numbers in behind the words.

This malware has been removed from too many machines in the last month or so, ranging from home PC’s, to corporate machines, that have corporate AV installed on them.

Note, that Malwarebytes Antimalware ( program removes the program with out any problems. You don’t need to buy anything (unless you want continuous protection – but I run it once a week to keep an eye on things)
Run a full scan using the free version, remove everything it finds and you should be good to go.
Another issue I’ve found is that some machines infected with this also have a secondary infection which turns your machine into a mass mailer spewing out thousands of spam emails (this may or may not be related to the first infection). So as well as doing the above, make sure the PC has up to date anti-virus software and run a full scan.
I hope that this will help others in the fight against the crap that is out there


The AntiVirus 2009 attacks are particularly troublesome as they can download and install silently on a PC by just visiting a website. However, the payload still requires a mouse click when the Antivirus pop-up suddenly appears stating the user has an infection. These are very advanced malware attacks to prevent, detect, and clean so avoidance is your best defence.

In fact, this clever social engineering attack may simulate past experiences where the legitimate Anti Virus product has found a virus and presented it to the user. Users who are not technically inclined may even think this is their own Anti Virus system warning them.

When a malware pop-up appears of any type, your PC is in trouble at that point. Sometimes however you can avoid more extensive damage by exiting out and getting immediate help in cleaning. If you can safely exit out of these types of pop-up windows your system for silent downloaders, sometimes your PC may not become infected.

Avoid any clicking or pressing the enter key, as “NO” or “CANCEL” may be secretly programmed to be a “YES”. Malware writers won’t have the best ethical conduct and they want to use any mouse click available to let the attack enter into the Windows environment (even a “NO” or “EXIT”).
Instead use this approach:


1. The easiest way to launch task manager in Windows is to press: Ctrl+Shift+Esc

2. Press the applications TAB (if it’s not already positioned there)

3. Select the pop-up TASK

4. Press End Task button at bottom to close it

5. Then seek technical help on cleaning … If you’re not experienced, my #1 tip is to have a friend or relative help you so that you do this safely and minimize losses to your PC.

Additional resources can be found from these experts below:

How to Safely Close a Pop-Up Window In Your Browser

Don’t Close That Pop-Up Window! – Clicking “No” May Mean “Yes”…epopup.htm?nl=1

How to invoke Task Manager


Frequently, people ask how they know if the site they landed on is serving up a safe program or if it is dangerous. One consideration is Web of Trust, a free Internet security addon for your browser. In fact, based on the results illustrated by Certified Bug in What is WOT, it appears that WOT is much more responsive than the formerly acclaimed McAfee Site Advisor.

Other steps to take are to stay up to date with security updates for all your software, not just Microsoft updates, install and maintain anti-virus software and a firewall. Additional solid advice is available in Bill Pytlovany’s recent article, Where did my Spyware come from?.

What do you do if your computer does become infected with one of the rogues like XP Antivirus? First and foremost, do not fall for the scam and send any money. Do not click any of the links they provide. Next, I would recommend installing, updating and runing a scan with Malwarebytes’ Anti-Malware (MBAM), allowing it to remove what is found. In providing help on the forums, I have seen how effective MBAM is in removing not only rogues like XP Antivirus but other malware as well.

Concerns about your PC security? We help thousands of new users every day to rid their PC of high risk spyware, adware, trojan, virus and rootkit infections
Is your PC really is safe?

Malwarebytes’ Anti-Malware

Download it directly from this page…(Win2K, XP, 2003 and Vista)



Get help from Ric Doerner!
Click the green loops above to get the download and leave me a comment below this entry if you wish for some assistance.


Greetings and welcome to(TONS) of

information site that can help you, your family and everything you do on the internet.

But please this is for personal computers only All prgrams that are offered on and links from this site too are free!  In no way should anyone ask you for monies for any of these. I help and ask for no monies either. Donations to the actual sites that make these programs are suggested.


Antivirus *FSECURE*

Don’t stop when you find the first piece of malware. It is not uncommon for a computer that has been exploited through a security flaw to have been penetrated more than once. Also, some malware opens backdoors that facilitate the installation of software that enables use of the infected computer by remote control.

Most links on this site are going to open in a new window if you just click on them, but if you press down the ball on the mouse it will open a new Tab.’s Security Check

F-Secure Online Virus Scanner


Webroot Software Free Spy Audit

By FaceTime Security Labs, makers of the X-Cleaner Spyware Remover

eTrust Pest Scanner

Thank you for that cleaning first, this will assist you in what you really require and the stuff here are security programs this should ensure that the program functions the way it should. Also note these programs are being used are no problem but Ram is suggested min. (512MB). Right-click on the “My computer” and click Properties. The main display window should say how much RAM.THE best and least expensive upgrade for your computer. )

Web of Trust (WOT) as a way to help recognize rogues when surfing the web by warning you before you interact with a risky website. In a comment to that article, Deborah from WOT posted a link to a video illustrating another scam designed to part you with your money. As Deborah explained, WOT tested it on a clean virtual machine and it reported finding over 500 errors, 31 of them classified as severe!

Because the video is a clear example of what people are faced with every day, I decided to share it here. The information presented in the fake scan in the video appears credible so is it no wonder why people panic and fall for these scams? Don’t you be fooled!

The extra layer of security provided by WOT will help keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. Definitely worth considering!


*If you need more sites for an online scan try these……*
kaspersky Kaspersky – Onlinescanner
A great one small file scanner
Panda Online-Scan Online-Scan (Panda Total-Scan)
ESET Online Scanner ESET Online Scanner
bitdefender Bitdefender/Online
When a threat is detected by the the BitDefender Online scanner, it will first attempt to disinfect (repair) the file, and only if it cannot be repaired, it will delete it. However, you can elect to change the secondary action from delete to “Report Only” or “Prompt for User Action”, so an infected system file is not deleted. This is the safest option to guard against false positives and system files that have been “patched” by malware. It is also the safest option if heuristics are used in detection, which they are by default.

    The options which are checked (enabled) in the image are the BitDefender default scanning options, and they may be changed.

Windows Live OneCare Free ScanWindows Live Free Scan – PC safety scan

McAfee Avert Stinger

Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system. Stinger utilizes next generation scan engine technology, including process scanning, digitally signed DAT files, and scan performance optimizations.

AntiTrojan Scans – Run one: Install the 30-day trial of TrojanHunter v. 5.0 (Win 98, ME, 2K, XP, 2003, and Vista)

Click here to find out what's running on YOUR computer!


These signs are created and served by’s webserver in real-time for each person that views them. Your IP address and other information are only visible to YOU, not to others, but because people see their own IP address and computer information displayed on a blog or in a public forum, they think that their information can be seen by everyone!

Read the privacy policy for more details. Click Here!

Securing Your Web Browsers document

More Info found at this Page………click Here

See anything that you think requires my attention? I have changed somethings due to your requests, If for any reason you have not heard from me please scan your computer with the suggested programs above. Thanks for I do always reply, but the mail has to reach me first. Good Luck.

Well then feel free to click on image.I will respond either soon or immediately!rad16.gifTruth is the way things are.

No comments yet

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: