Home Blog Page 2

Properly uninstall software with Revo Uninstaller – Le Crabe Info

0

For uninstall software on Windows, you probably use the traditional method which consists of using the uninstaller (also called an uninstaller) of said software via the Windows Applications and Features window.

The crab

Crab helped you? Help him back by disabling your ad blocker!

(thanks for the clip )

Unfortunately, the vast majority of uninstallers don’t do their job properly : They leave behind a lot of files and registry keys that remain unnecessarily stored on your computer’s hard drive. Uninstalling software was never complete.

You want to uninstall completely software on your Windows PC so that there is no trace of it on your hard drive?

In this tutorial, we will see how to properly uninstall software on Windows using Revo Uninstaller, an uninstall software that allows you to uninstall any software in depth and delete all the unnecessary files that the uninstallers leave behind.

Revo Uninstaller: presentation

Revo Uninstaller is an uninstall software that allows you to completely erase any software on your Windows PC.

It scans the hard drive and searches for files and registry keys that the software left behind after it was uninstalled.

Two versions of Revo Uninstaller are available: one free and one paid.

Revo Uninstaller Free

Revo Uninstaller Free is free and has the following features:

  • Uninstaller : this is the main module of Revo Uninstaller. It allows you to uninstall software completely and to deal with situations where software does not uninstall normally. It replaces the Windows Applications and Features window: it first runs the uninstaller of the software in question then searches for and deletes the remaining data. Recalcitrant programs, temporary files and other unnecessary data left after the standard uninstallation are permanently deleted.
    Uninstaller – Revo Uninstaller
  • Hunter Mode : allows you to uninstall software more flexibly. When you activate Hunter Mode, the main Revo Uninstaller window disappears and a new target icon appears. Just point the target at the window or the icon of the software to uninstall and Revo Uninstaller will display all the available options in a practical menu. Hunter Mode can come in handy when you want to uninstall an unknown program.
    Hunter Mode – Revo Uninstaller
  • Windows Apps : allows you to uninstall WUP applications (installed via the Microsoft Store).
    Windows Apps – Revo Uninstaller
  • 8 cleaning tools:
    • Startup Manager : controls the applications that launch when Windows starts
    • Outdated File Cleaner : eliminates unnecessary files
    • Windows tools : gives access to some useful Windows tools
    • Browser cleaner : empty web browser history
    • MS Office cleaner : empty the history of Microsoft Office
    • Windows cleaner : eliminates unwanted files from Windows
    • Delete evidence : permanently delete confidential data
    • Definitive erasure : permanently delete files and folders
    Tools – Revo Uninstaller

Revo Uninstaller Pro

A paid version « Revo Uninstaller Pro » is available for $ 24.95.

The Pro version adds the following features (in addition to those of the free version):

The crab

Crab helped you? Help him back by disabling your ad blocker!

(thanks for the clip )

Cleanly uninstall software with Revo Uninstaller

To properly uninstall software with Revo Uninstaller, follow these steps:

  1. Download and install Revo Uninstaller.
  2. Activate Windows System Restore.
  3. Open Revo Uninstaller> Uninstaller.
  4. Double click on the software to uninstall or right click on it> Uninstall.
  5. Check that the box Create a system restore point before uninstalling is well checked then confirm the uninstallation of the software by clicking on the button To confirm.
  6. Revo Uninstalle now runs the software uninstaller. Follow the instructions until the « normal » software is uninstalled.
  7. Revo Uninstaller will now scan the hard drive for files and registry keys left by the software. For a full analysis, select Advanced as scan mode then click on the button Scan.
  8. Check that the registry keys found by Revo Uninstaller correspond to the software you just uninstalled (uncheck in case of error or doubt) then click on the button Remove.
  9. Do the same for the files and folders that the uninstalled software to leave behind then click on the button Fini.

Congratulations! You have uninstalled software cleanly and completely using Revo Uninstaller. Use it instead of the Windows Applications and Features window for complete uninstalls! 👍

The crab

Crab helped you? Help him back by disabling your ad blocker!

(thanks for the clip )

Useful links

Tutorial and Guide Spyware Doctor

0

Spyware Doctor is no longer advised but rather advised against by malekal.com, read the Fake Security Blogs: SpyHunter and SpywareDoctor page to find out why.

In addition, there remains an effective anti-spyware, see the page Eradication test: 10 security software on the grill

  1. Tutorial et Guide Spyware Doctor
    1. Installation
    2. First start of Spyware Doctor
    3. Scan your computer
    4. Tools
    5. Settings
    6. Liens

Installation

You can download Spyware Doctor from this download page
This version is currently in beta version, which means that it is not finalized, it is not currently advised to use it.
You must also register to download this version.

  • Execute the freshly downloaded file
  • Welcome to the installation program, click on the button following to go to the next step

Tutorial et guide SpywareDoctor

  • You must then accept the license to use, Click on the button I accept the terms of the contract
  • Click on the button following to go to the next step

Tutorial et guide SpywareDoctor

  • You must indicate in which folder Spyware Doctor will be installed, by default it offers you the folder C:Program FilesSpywrare Doctor
  • You can modify this path using the button Browse
  • Click on the button following to go to the next step

Tutorial et guide SpywareDoctor

  • The installation wizard then asks you, if you want to activate Spyware Doctor protection when Windows starts, if you wish, leave the option Activate Spyware Doctor protection when Windows starts checked.
  • Click on the button following to go to the next step

Tutorial et guide SpywareDoctor

  • When the copying of files is finished, you get the window below.

Tutorial et guide SpywareDoctor

  • Once the copy is finished, click on the button Finish.
  • The installation will be completed and the Smart Update wizard will launch.

Tutorial et guide SpywareDoctor

  • Click on the button following to go to the next step

Tutorial et guide SpywareDoctor

  • You must select the items to update.
  • Click on the button following to go to the next step

Tutorial et guide SpywareDoctor

  • When the update is finished, click on the button Finish.

Tutorial et guide SpywareDoctor

First start of Spyware Doctor

You can start ewido from the Start menu / Programs / Spyware Doctor / Spyware Doctor
The interface is simple, since it is presented with vertical tabs on the left and in the central part the menus.

On the main window you can view the general information (guard activated, product version, signature version, last scan performed, etc.).

Note that you can launch an update at any time from the button Smart Update top right.

Tutorial et guide SpywareDoctor

To start a scan of your computer, simply click on the Start Scan button on the left.
You will then have the choice between one:

  • A quick scan that scans only the parts of the computer that can host malware
  • A complete scan that scans all parts of the computer
  • A custom scan where you choose what Spyware Doctor should scan.

In the right part a progress bar indicates the progress of the scan.
Below, the number of elements scanned and detected is indicated.

Tutorial et guide SpywareDoctor

At the end of the scan, the detected elements appear in the form of a list with a description on the right.
All items are automatically checked.
Note that you can from the option Create a system restore point, as the name suggests creating a recovery point, this can be useful to prevent various malfunctions following the eradication of malware.

Click on Repair and continue to start removing the checked malware.

Tutorial et guide SpywareDoctor

From this menu, you will find the tools installed by Smart Update.
For the moment, only one tool is available: Spyware Doctor Network
The latter makes it possible to send syspect files to the software editor so that the latter verifies the integrity of the latter.
If the file is malware, it will be added to the virus definition of the software.

Tutorial et guide SpywareDoctor

The OnGuard

The Guard protects you from threats, it constantly scans the files you open to determine if the file is a threat. Here is the list of protections:

  • Startup Guard : Checks the programs that launch when Windows starts.
  • Cookies Guard: protects you from tracking cookies
  • Exploit Guard : protects programs from security breaches and their vulnerabilities against malicious activities.
  • Browser Guard: protects Internet Explorer from Hijackers (modifies browser settings with malware).
  • Immunizer : Immunize your computer against the latest ActiveX threats.
  • IM Guard : Protects instant messaging (MSN messenger) clients against malicious URLs.
  • Keylogger Guard : protects your computer from malicious programs which aim to recover your passwords and bank codes.
  • Network Guard : prevents malware from modifying your network parameters (DNS, HOSTS files) and inserting LSPs.
  • Popup Blocker : blocks popup windows when you surf the net.
  • Process Guard : checks the programs started and stops them in case it is malicious.
  • Scheduler : allows you to schedule different scans at specific times / dates.
  • Site Guard : warns you when you arrive on suspicious sites, this includes spoofing.

Settings

This part allows you to customize the settings of Spywares Doctor.
Tutorial et guide SpywareDoctor

Liens

Official documentation (in English)

If you still have problems, come post your questions on the forum

Secure your computer and know the threats
Guide de suppression des malwares (SpySherrif, Spyaxe, SpywareStrike, Winbound, etc..)
Specific Spyware / Malware removal tools
Other anti-spyware tutorials

 

Tutorial and Guide SpyRemover

0

SpyRemover is an anti-spyware that can remove adware / trojans and spyware.

Its interface is close to that of SpyBot

SpyRemover does not offer all the functionalities of large anti-spyware (real-time protection, etc.) but it is a good disinfection tool to try!

SpyRemover is a Spybot – Search & Destroy clone with a few more features, one can actually wonder if it is worth paying while Spybot – Search & Destroy is free.
The tutorial is not made to push you to buy the product, especially if Spybot – Search & Destroy is right for you!

  1. Tutorial SpyRemover
    1. Installation de SpyRemover
    2. First start of SpyRemover
    3. Scan with SpyRemover
    4. Additional options
    5. Liens

Installation de SpyRemover

Here is a link from which you can download SpyRemover: Download SpyRemover
Double click on the freshly downloaded file

  • The installer window opens, click on the button Next to go to the next step

Tutorial SpyRemover

  • You must then accept the SpyRemover license, by checking I accept the agreement
  • Click on the button Next to go to the next step

Tutorial SpyRemover

  • The installation program then asks you in which folder you want to install SpyRemover, by default it offers you the folder C:Program FilesSpyRemover if this folder does not suit you, you can click on the button Browse to install SpyRemover in another folder.
  • Click on the button Next to go to the next step

Tutorial SpyRemover

  • The installation program asks you in which folder SpyRemover will appear in the menu Start / All programs. Click on the button Next to go to the next step

Tutorial SpyRemover

  • A summary window of installation information is displayed. Click on the button Next to go to the next step

Tutorial SpyRemover

Scan with SpyRemover

In order to increase your chances of malware eradication, it is VERY HIGHLY advised to scan your computer in safe mode: How to restart in safe mode

To start downloading the update, click in the menu at the top left: Search Now
At the bottom left of the window, you can view the infection being scanned, as well as the progress of the scan with the number of infections scanned on the total known, in the screenshot below you can see the scan spy-check 106th infections out of a total of 47,737.
Tutorial SpyRemover

The detected elements appear in the form of a list, By clicking on the + in front of each element you can view the files belonging to this infection.

Tutorial SpyRemover

To delete the selected elements click on the button at the top Remove selected items :Tutorial SpyRemover

Deleted items are marked with a green check mark.

 

Backdoor.Linux.Bew.a and Client BitCoin

0

Here is a little post about an infection found on servers that I have been administering recently.
It all starts with an alert by email from Munin freshly set up. Munin is an rddtools grapher who sends alerts when thresholds are exceeded, in this case it was the CPU.
Which is super convenient.

Les graphs :

hack_serveurs2 suddenly, a little tour on the server and I launch top and there the drama, I see a bfgminer process, which looks like a Bitcoin client from the name.

hack_serveurs3 I take a look at the processes and there I see a .bbb – which is not good.
Files starting with. under Linux are hidden.
The latter is executed as root.

hack_serveurs4

So I launch the command

find / -regextype egrep -regex ".*/.[a-z0-9_.-]+$" -exec file {} ;|grep executable

in order to list the hidden files likely to be executables.
Bingo is crowded:

/usr/local/psa/tmp/…/.tar: ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, stripped
/usr/local/psa/tmp/…/.bbb: ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, stripped
/usr/local/psa/tmp/…/.ew3: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, corrupted section header size
/usr/local/psa/tmp/…/.true: ELF 64-bit LSB executable, AMD x86-64, version 1 (SYSV), for GNU/Linux 2.6.9, dynamically linked (uses shared libs), stripped

A small recovery of files and scan on VirusTotal, we find a certain Backdoor.Linux.Bew.a whose detections are quite moldy:
https://www.virustotal.com/fr/file/b208643dbec66168ee66d8b7d8210a2156a2444e3bc9885be9ae07633a50cbf5/analysis/1395411155/
https://www.virustotal.com/fr/file/f4308d69578ffbe48216e99adfa1ac8c7fe357ac86a602c655e3241f29687323/analysis/1395411156/
https://www.virustotal.com/fr/file/7498e90c019f783c9e05abd33de746e78fb449f36d6a741d3c52502c0a45f815/analysis/1395411139/
https://www.virustotal.com/fr/file/7498e90c019f783c9e05abd33de746e78fb449f36d6a741d3c52502c0a45f815/analysis/1395411139/

Some files date from June 2013.

There is also a crond launched by Apache.

hack_serveurs5

The bitcoin process is in defunct, we can’t kill it directly.
You must kill the parent process (here httpd).

hack_serveurs4 hack_serveurs8

Note that ps does not show everything, at least it shows the process names with the desired names, suddenly it is possible to use already existing process names.
pstree lets see this:

hacklinux_pstree

A small egrep -r « base64 | eval | deflate | REQUEST » * php and there are some PHP Backdoor on the sites:hack_serveurs6 hack_serveurs7

It appears that the malware has been dropped on a Parallels Plesk Panel vulnerability
Note that the servers (fifteen) had no firewall, it does not help either.

When you know it is relatively conspicuous, especially by linking the processes the command find helps a lot.
We see here the importance of a minimum of monitoring tools that can warn of the presence of a Bitcoin client when the latter is a bit too much.

EDIT –

A small edit with a variant, cpio: open errors when using yum.

hack_linux_permissions This is because we cannot write in certain folders, in particular / usr / bin and / sbin
Hackers added s (secure deletion) i (immutable) a (append only) attributes in extended permissions.

The lsattr command is used to list the attributes and the chattr command to modify them, all the extended attributes must be removed at once: chattr -R -i -a -s
hack_linux_permissions2

 

Tutorial and Guide LogMein

0

LOGMEIN is software that allows you to control your PC from any other computer with an internet connection.
In addition, several products are offered to you on the publisher’s site:
LogMein Pro, LogMein IT Reach, LogMein … (LogMein is the free version and the others are paid versions with a 30-day trial period …
At the end of this period you can either switch to the free version, or buy the product …).

Summary

  1. Tutorial et Guide LogMein
    1. Summary
    2. LogMein overview
    3. Installation
    4. Conclusion

LogMein overview

LogMein is a program which, like TeamViewer or Spark Angel, allows you to take control or share your desktop via the internet.
In this domain of grip, VNC is often used, only the big defect of VNC is that it acts as a service, the client connects to the server part to take control of the machine. At a time when the boxes are very popular, it is advisable to create a routing to allow the connection.

LogMein works differently, the two workstations (the one taking the hand and the one whose hand we want to take) acts as a client and connects to a third-party server.
There is no need to change your network configuration.

Installation

The LogMeIn site: https://secure.logmein.com/

  • Once on the publisher’s site, click on Download LogMein
  • Click on the button Next to go to the next step.
Tutorial et guide LogMeinFree
  • Complete by indicating your e-mail address …
  • Click on the button OK
Tutorial et guide LogMeinFree
  • Launch the downloaded application.
  • You then get the window below, click on following.
Tutorial et guide LogMeinFree
  • You must accept the software user conditions.
  • Click on I accept to accept the LogMein license agreement.
Tutorial et guide LogMeinFree
  • Choose the type of installation, (I recommend the type By default.)
  • Click on following to go to the next step.
Tutorial et guide LogMeinFree
  • Enter a brief description to identify the computer in the future. (Example: the name of the owner of the computer.)
  • Click on following to go to the next step.
Tutorial et guide LogMeinFree
  • You must choose the location where the application will be installed (by default C: Program Files LogMeIn)
  • If you want to change the destination folder, click on Browse.
  • Then click on following to go to the next step.
Tutorial et guide LogMeinFree
  • Installation is complete, click on Finish to complete the installation.

Tutorial et guide LogMeinFree

An icon has been added to the task bar at the bottom right of your screen.

Your computer is now accessible via the publisher’s site.

To control his / her PC from another computer, go to the publisher’s site:
https://secure.logmein.com/home.asp?lang=fr

Tutorial et guide LogMeinFree

Once on the site, connect using your E-mail and your password entered during the initial registration on the site.

You then get the window below.

  • Your / your « client computer (s) » is / are indicated there.
  • Then click on the name of a computer to connect to it. (If you wish to add a computer, then click on « Add a computer« and enter their name.)

You will find at the top left of this window several options:

  • Groups: to classify your computers by categories (ex: Family, Friends, Office …);
  • Alerts: Alerts are only available for computers with LogMeIn IT Reach subscriptions (Paid LogMein version). Alerts notify you of specific events or problems that occur on one or more IT Reach computers. You can set up multiple alerts and deploy them separately to specific groups of computers;
  • Configuration: Configuration management is only available for computers with LogMeIn IT Reach subscriptions. This feature allows you to configure LogMeIn security preferences and settings and deploy them to any group of IT Reach computers; Inventory: allows you to have an overview of the inventory of hardware, software … Options available only for computers with LogMein IT Reach subscriptions;
    • Users: allows you to add other administrators and secondary users who can control computers …;
    • Subscriptions: to consult the number of computers assigned to this or that product (Pro, free and IT Reach) …;
    • Installation links: to deploy paid products on remote computers;
    • Reports: generate reports for your computers (to know the type of subscription, start date, status …);
    • Account: modify your information;
    • Billing: only applies to you if you have a subscription for a paid product.

Just click on the name of a computer to connect to it.

Tutorial et guide LogMeinFree
  • The connection is made, you then get this window. Enter the username and password.
  • These are the ones used to open the windows session … It is then entirely possible to create a Windows user expressly for getting started with your own password that you will give to your correspondents, for more user management information, see Windows user management

Tutorial et guide LogMeinFree

You then get the window below.
When you take control of a computer for the first time, from a computer equipped with the Firefox browser, you will be offered the installation of an extension module for Firefox. It is advisable to install it.

Tutorial et guide LogMeinFree

You can, if you wish, modify the parameters and / or options (preferences) for the computer to which you are connected, which are among others:
(To set preferences, simply click on the « Go >> » button in the « Preferences » column)

Remote access control parameters:

  • View and change preferences for remote access sessions

Security settings:

  • Security settings on your remote computer

Network settings:

  • View and modify the connection data of your remote machine

Log settings:

  • Preferences for LogMeIn notification files

Restart options:

  • Look at the options to restart LogMeIn or restart your remote computer

Advanced options:

  • View and modify the advanced options that determine the behavior of LogMeIn.

You can now control the computer with which you are connected, for this you just need to click on the « Go >> » button in the « Remote control » column or click on the « Remote control » button in top left of the page.

Note : when you take control of a computer for the first time, from a computer equipped with the Firefox browser, you will be offered the installation of an extension module. It is strongly recommended to install it, because it makes rendering of what is happening on the remote computer fluid.

Tutorial et guide LogMeinFree

Once you have taken control of the remote computer, a message will appear on the top right of the screen, informing your correspondent that his computer is controlled remotely by …
Tutorial et guide LogMeinFree

This is what your screen looks like after you take control of a computer.
You can now do whatever you want (almost anything …) on the remote computer, as if you were sitting there in front of it!
It is also possible to switch to « Full screen » mode, for this you must click on the « Full screen » button. You will then have the impression of really being at the computer.

On the bottom right of the page you can see that there is a yellow padlock and the inscription « Encryption: 256 bits ». This means that all transactions made by LogMein are encrypted in 256 bits …

To stop controlling the computer, click the « Disconnect » button.

Conclusion

Any computer you want to take control of must have logmein software.
You can then take control of it from any computer (linux, mac, windows …) with an internet connection.
LogMein will be very useful if you take care of the computers of your family, your friends …
You can also work on your desktop PC from home or vice versa …

 

Tutorial Kaspersky Trial

0

Here is a tutorial on Kaspersky Trial antivirus.

The purpose of this tutorial is to guide you to install the trial version of Kaspersky in order to clean your computer of any infection. This tutorial will not describe all the features available on this antivirus.

  1. Tutorial Kaspersky Trial
    1. Installer Kaspersky Trial
    2. Analyze and disinfect the computer
    3. Other Links

Installer Kaspersky Trial

You can download Kaspersky Trial from this link: Download Kaspersky Trial

  • Once the file is downloaded, Double-click it to start the installation
  • A copy of files is then made

Tutorial Kaspersky trial

  • You must then choose the installation path of the program, I strongly recommend that you leave the default path.
  • However you can change the path from the button Modifier

Tutorial Kaspersky trial

  • The installation program then welcomes you.
  • Click on the button following to go to the next step.

Tutorial Kaspersky trial

  • You must then accept the license to use the software, for this, check the box « I accept the terms of the license agreement »
  • Click on the button following to go to the next step.

Tutorial Kaspersky trial

  • The installation program then asks you for the path where Kaspersky Anti-Virus will be installed.
  • I advise you to leave the default path, you can modify the path from the button Browse
  • Click on the button following to go to the next step.

Tutorial Kaspersky trial

  • You must then select the type of installation
  • Click on the icon Custom

Tutorial Kaspersky trial

  • Then click on Tutorial Kaspersky trial in front of Protection components
  • From the Dropdown menu, select Function not usable
  • Click on the button following to go to the next step.

Tutorial Kaspersky trial

  • To start the installation, click on the button Installer

Tutorial Kaspersky trial

  • The files are then copied

Tutorial Kaspersky trial

  • When the installation is finished, you must click on the button following to start the configuration wizard

Tutorial Kaspersky trial

  • The assistant offers to activate Kaspersky Anti-Virus, in the context of disinfection, select the option:
    • Activate the trial version (30 days)
  • Click on the button following to go to the next step.

Tutorial Kaspersky trial

  • An information window opens to indicate if the license installation was successful
  • The key number and expiration date appear at the bottom of the window
  • Click on the button following to go to the next step.

Tutorial Kaspersky trial

  • It is then necessary to carry out an update of the virus signature base of the antivirus so that the latter detects the latest viruses.
  • I advise you to leave the update mode on Automatic

Tutorial Kaspersky trial

The Configuration button opens the configuration window which allows you to configure:

  • from the LAN Settings tab the way you connect, you have the option to configure a connection via a proxy
  • from the Update source tab, the Kaspersky server from which updates will be downloaded, note that you can change the location of the server in the lower part of the window.

Tutorial Kaspersky trialTutorial Kaspersky trial

  • To start the update, click on the button Update now
  • A new window opens then, downloading and installation of updates is done
  • When the update is finished, click on the button To close to return to the previous window.

Tutorial Kaspersky trial

  • Click on the button following to go to the next step.

Tutorial Kaspersky trial

  • The wizard offers you to configure automatic analyzes
  • In our case, uncheck all the options, then click on the button following to go to the next step.

Analyze and disinfect the computer

To detect and especially to be able to remove a maximum of malware, it is advisable to perform the scan in safe mode.
Follow the Guide to Restart in Safe Mode

Once the computer is in safe mode, start Kaspersky like this:

  • Click on the Start menu then All Programs
  • In the menu list, select Kaspersky Antivirus then click on the icon Kaspersky Antivirus
  • A gray K icon will appear at the bottom right next to the clock (see below), you can also get the message below

Tutorial Kaspersky trial

To start the scan, right click on this icon then click in the drop-down menu on Analyze the Workstation

Tutorial Kaspersky trial

Let the scan take place entirely, at the end of the scan delete all detected malware from the button Repair all at the bottom right.
In the popup that appears, check the option « Apply to all similar cases« then click on the button Remove.

Tutorial Kaspersky trial

From the Save-under button, you can save the scan report, you can then copy and paste it on the forum.

 

CounterSpy Tutorial and Guide

0

CounterSpy is an excellent anti-spyware by the software publisher Sunbelt. Sunbelt is also the editor of the famous free Kerio firewall: Tutorial and configuration of Kerio Firewall.

    Installation

    You can download CounterSpy from this download page
    This version is currently in beta version, which means that it is not finalized, it is not currently advised to use it.
    You must also register to download this version.

    • Execute the freshly downloaded file
    • Welcome to the installation program, click on the button Next to go to the next step

    Tutorial et guide CounterSpy

    • You must then accept the license to use, Click on the button I Agree
    • Click on the button Next to go to the next step

    Tutorial et guide CounterSpy

    • You must indicate in which folder CounterSpy will be installed, by default it offers you the folder C:Program FilesSunbelt SoftwareCounterSpyConsumer
    • You can modify this path using the button Browse
    • Click on the button Next to go to the next step

    Tutorial et guide CounterSpy

    • Copying files is then ready …
    • Click on the button Next to go to the next step

    Tutorial et guide CounterSpy

    • When the copying of files is finished, you get the window below

    Tutorial et guide CounterSpy

    • Once the copy is finished, click on the button Finish to complete the installation.

    Tutorial et guide CounterSpy

    Assistant de configuration de CounterSpy

    You can start CounterSpy from the Start menu / Programs / SunBelt Software / CounterSpy / CounterSpy
    At the first start, the configuration wizard is launched to configure the software.

    • Click on the button Next to go to the next step

    Tutorial et guide CounterSpy

    • You can register the software by clicking on the button Register CounterSpy Now, this allows you to keep the definition of spyware up to date. In case you plan to use CounterSpy only to clean your computer, you can skip this step.
    • Click on the button Next to go to the next step

    Update

    During the first start, CounterSpy updates the definition of spyware.
    When the download and installation is complete, click the button Close

    CounterSpy is then started. In the top part, an icon bar is available horizontally, you can navigate through the various options of the software from there.

    In the main window, you will find the classic information, namely:

    • The last scan carried out with the elements detected on the right side.
    • At the bottom left, the possibility to configure automatic scans.
    • At the bottom right, the date of the definition of spyware.

    To start a scan of your computer, simply click on the Scan now button on the software home page.
    The scan then starts:

    • Top left, you can view the item being scanned
    • Bottom left, the last infectious elements detected.
    • On the right, statistics on the progress of the scan.
    Tutorial et guide CounterSpy

    Active Protection checks the files you download and run on your computer. If the latter is potentially dangerous, an alert window will open (see below) to warn you.

    You can then stop the execution of the program by clicking on the button Block.
    If you are sure that this program is not dangerous, then click on the button. Allow.

    L’option Rember this action allows you to record the action for the said file, if you replay this file later, CounterSpy then performs the same operation (allow or block).

    Tutorial et guide CounterSpy

    Real-time protection is configured from the button Active Protection.
    Protected items appear in a list. You can deactivate certain elements by clicking on the button:

    Tutorial et guide CounterSpy

    System Tools

    My PC Explorers

    My PC Explorers allows you to configure Windows elements such as startup programs, running processes, BHOS, LSP etc … This option is therefore intended for an advanced audience.
    The various configuration options are accessible from a menu on the left.

    My PC checkup

    My PC Checkup allows you to scan your computer to increase the security of it.
    After clicking on the button Scan to start the scan of your computer, you get a list of the elements at risk.
    Click on the button Check All at the bottom to select all these elements then click on the button Continue.
    CounterSpy will then correct these risks.

    History Cleaner

    History Cleaner allows you to delete the histories of different elements and programs of Windows in order to protect the confidentiality of your computer.
    After clicking on History Cleaner, the list of different histories is displayed, you can then check or uncheck the items you want to clean.
    The button Clean history then starts cleaning.

    Tutorial et guide CounterSpy

    Quarantine

    From the Manage Quarantine menu you can manage quarantined files.
    These appear in the form of a list, by checking the elements you can:
    Delete items: Permanently remove selected item
    Remove items from quarantine:

    Note that the check all items button, you can select ALL the elements of the list
    Tutorial et guide CounterSpy

    Settings

    CounterSpy’s settings are accessible from the top menu View then Settings.
    A menu on the left allows you to navigate in the various categories, we find in particular a good part of the configuration which was carried out by the configuration wizard after the installation phase.

    Tutorial et guide CounterSpy

     

    router or box: understanding how it works

    0

    The Router is a network device for private individuals which allows the sharing of internet connection for several computers.
    In France, the routers of the access providers are called Box and also allow access to streaming TV.

    This page describes a bit the configuration of a consumer router.
    You will find screenshots of the Orange Livebox and a Netgear DG983GT router.

    router / box: how it works
    router / box: how it works

     

    General information on routers and consumer boxes

    Consumer routers are boxes designed to share the Internet network with several network devices such as computers, smartphones, tablets, etc.
    These also act as Wi-Fi access points.
    In general, therefore, the box consists of antennas for Wi-Fi and Ethernet sockets for connecting a computer.
    In France, access providers provide box type routers which can also provide access to Internet television and VOIP.

    Here are the components of a router:

    • A waiter DHCP to distribute the IP configuration to the equipment that connects to it (cable or Wifi).
    • A relay server DNS with a cache to resolve DNS resolutions.
    • Modem with internet connection. The possibility of connecting to the internet network by ADSL or cable.
    • A firewall and port forwarding (NAT).
    • Some routers can ship parental control or WEB address filter.
    • Connection to DynDNS type services.
    • Journal de logs connection and blocking.

    Boxes are very little different from routers. Simply put, they are rented by service providers.
    They can be pre-configured to log in with your credentials.
    Finally, some ISPs manage updates and the user does not have to worry about them.
    But from a technical point of view, there are no big differences between a router and box

    Access the box or router management interface

    An article explains how to access the WEB interface for managing a router or a box.
    Please refer to this one from this link:

    An identification phase protects access to the admin interface of the router or box.
    For example on a Livebox, there is a diagram of the network with the connected devices.

    Connection to the admin interface of a Livebox.

    Once identified we get an interface which can replace this:

    Netgear IP Lan

    We generally find the same things presented in different ways depending on the router model.
    But here is a list of generic items.

    • The configuration of the internet connection (username etc …
    • Wifi (ESSID, WPA security, WEP etc).
    • The firewall and filtering part.
    • The possibility of making port transfers.
    • WEB filtering or parental control.
    • Optionally logs and connection information (machines connected via Wifi or DHCP, etc.).

    Finally very often, a CD-Rom is provided with the box or router which allows the installation and the automatic configuration of the internet connection on the network stations.
    Only downside, this often installs additional applications that are not really useful.
    For example with Orange and its connection kit, WEB browser, others can install a wifi connection manager that weighs down the computer.

    Finally note that Windows has everything you need to configure the connection by itself.

    Internet connection configuration

    We find the information necessary to establish the internet connection, namely the username and password in the case of an ADSL connection.

    On the connection information side, we find:

    • the type of connection with the connection identifiers provided by your internet service provider.
    • The IP address of the internet connection.

    In general in this page, you can relaunch the internet connection.

    Router login page
    Router login page

    Configuration Wifi

    The router configuration then has a section relating to the Wifi configuration.
    There are connection information:

    • SSID name
    • WEP, WPA2 etc security protocol and associated paraphrase.
    • Finally, the possibility of MAC filtering.

    For more information on how wifi works:

    Wifi Livebox
    Wifi Livebox

    Firewall / Firewall: Port transfer

    Routers are firewall menus allow the opening of ports to connect to the router.
    For example for a remote connection on the management interface of the router or to perform port forwarding.
    Port forwarding is used when PCs on the network need to run as servers on specific ports.
    Some services require this, such as FTP, VNC, IRC client.
    Finally, port forwarding may be automatic via the program that does the service if the latter manages the UPnP protocol.
    However, security applications must be taken into account with UPnP, read: UPnP and security risks

    Finally the following article details the transfer of ports: the Nat principle.

    Thus we generally find:

    • A source IP with a source port
    • A destination IP (network machine) and its destination port
    Netgear Firewall

    The configuration or information possibilities then change depending on the router or the box.

    Livebox Port forwarding

    Finally here are screenshots with the possibilities offered by a Netgear router.

    Router hacking

    Router hacking has been on the rise since 2015.
    They are part of the more general attacks against IoT connected objects: Internet of Things (IoT) and security.
    In addition, the news on the following forum often talks about it: Hacking of routers on the rise

    :

     

    Twitter Video Downloader

    0

    Twitter Video Downloader is a free software program that allows you to save videos you can watch on Twitter to your computer. Convenient for retrieving a video you like or want to keep!Twitter Video Downloader

    By default, it is indeed impossible to save a video broadcast on Twitter. To get around this restriction, simply install Twitter Video Downloader.

    In your usual web browser, right-click on the video of your choice and select the Copy Video Address command. Paste it into Twitter Video Downloader and click the Start Download button. The Twitter Video Downloader will start downloading the video to your computer.