Blog

Posts Tagged upgrade my pc

How to remove the YAC virus – Removal Guide Yet Another Cleaner | Malware Removal – Software & Tutorials

How to remove the YAC virus – Removal Guide

The YAC virus (also found as YAC Search virus, YACmx virus, YAC Cleaner, Yet Another Cleaner virus, Elex do Brasil Participações Ltda, YAC computer virus, Woodtale virus, and more) is dangerous malware categorized as scareware (rogue software) that is promoted as an unregistered (free) and registered (full) Microsoft Windows cleaner and optimizer tool; however, YAC Cleaner is essentially considered a non-beneficial rogue Windows Optimizer and Antivirusprogram that participates in unethical marketing practices and performs fraudulent, non-beneficial computer scans with highly misleading results in order to create customers and collect user information using scare tactics.

remove YAC virus

YAC promotes a free trial is a that displays misleading information, misleading scan results, including a quick clean scan, deep clean scan, system boost, and more.

Once installed, the non-beneficial YAC cleaning software will begin to perform a scan without authorization. The scan will then claim that there are a numerical amount of problems detected, and will also claim that a certain amount of them are not safe. Most of the time the malicious results shown do not exist on the computer system and is fabricated by the software.

YAC malware also opens internet browser windows and cause unwanted pop-ups to appear, as well as change your homepage, default search engine, and start page causing your internet browsers to constantly start up on and redirect to search.yac.mx and other websites when users search the web, open a browser window, open a new browser tab, and perform similar tasks. In Google Chrome, YAC hijacks the startpage settings, home page settings (as well as causes the home button to appear), and default engine.

YAC pop-up

YAC will also collect and distribute user information manually submitted online while the program is installed or information submitted to the initial party and involved third-parties, as well as what they describe as anonymous usage information (anonymous information can still be used to identify a person or make communications).

YAC will collect complete computing and browser activity. The information collected is often submitted to marketing and mailing lists. Victims have reported excessive email spam from YAC Software and third-parties, as well as junk mail and telephone calls from telemarketers at home.

YAC malware often bundles with third-party adware, spyware, and browser hijackers used to display pop-up ads, banner ads, coupon drop-down ads, and cause browser redirections and start-ups.

YAC.mx and the items they develop and promote are very malicious and have connections to Hong Kong, Brazil, Mexico and other countries. In most cases the items seem to be repackaged and renamed.

YAC Cleaner is confusing and difficult to install for many users.

YAC has also been documented spam commenting and forum spamming many websites, including ours in efforts to promote the product and defame legitimate software used to remove it such as Malwarebytes.

YAC.mx also misleads their web visitors by displaying defamatory and false information about legitimate sources including our website, Botcrawl.com in efforts to create customers via unethical marketing tactics. You can view images of this in the gallery below. Please note, we are not a“malicious thing” that does any harm to anyone, all information displayed on the website is false. There is no need for us to file suit against them at the moment as this patently potrays how unethical their product and website is.

Yac.mx published this post after learning about our research of their product.

How does YAC malware get onto a computer?

YAC Software can be manually and voluntarily downloaded from a variety of locations including download.com, and others; however, most users claim that YAC scareware installed without consent.

YAC also bundles with third-party freeware and shareware.

In some instances YAC scareware may be contracted via advertisements, email spam, and compromised social media content.

   Green Arrow Bullet   How to remove YAC Malware

  1. Automatically remove YAC – Scan for and automatically remove YAC malware
  2. Manually remove YAC – Remove/Uninstall YAC and third-party malware if allowed

1. Automatic YAC removal

Use the instructions below to automatically remove YAC scareware and third-party malware.

Malwarebytes Anti-Malware

1. Install the free or paid version of Malwarebytes Anti-Malware.

Purchase   Download

2. Once Malwarebytes is installed, run the program. If you are using the free version of Malwarebytes you will be prompted to update the database, make sure to do so.

3. On the first tab labeled “Scanner” select the Perform full scan option and click the Scan button to perform a full system scan. Malwarebytes will automatically detect malware infecting the computer system.

Malwarebytes Perform Full Scan

4. Once the malware scan is complete, Malwarebytes may prompt a notice stating malicious objects were detected. Select the malicious objects and click the Remove Selected button to completely remove the malicious files from your computer (the image below shows a file that is NOT selected) or click the Delete button to remove quarantined files.

Malwarebytes Gadgetbox

CCleaner

CCleaner can be used to automatically repair internet browser settings startup up settings, and uninstall stubborn and possibly rogue YAC software.

1. Install the free or paid version of CCleaner by Piriform.

CCleaner Analyze Cleaner

2. Once installed, open the program and navigate to Cleaner > Windows/Applications and click the Analyze button. Afterwards, click the Run Cleaner button on the bottom right of the program interface.

SpeedUpMyPC 2013 start up removal

3. Next, navigate to Tools > Startup and search through each tab starting from windows, internet explorer, etc., all the way to Content Menu, for additional suspicious entries and click Disable and Delete once anything is found. Something to look for might include the title “YAC.”

4. To automatically uninstall YAC and unwanted programs, navigate to the Uninstall tab and located software in the list of installed programs. Uninstall the programs as selected. Keep in mind that the publisher of the program often changes from Elex do Brasil Participações Ltdalocated in Sao Paulo, Brazil to WoodtaleMedia.com and iSafe Virus Removal.

2. Manual YAC removal

Use the instructions below to manually uninstall rogue YAC software using generic removal procedures (if allowed), as well as third-party malware that may have installed alongside rogue Windows optimization software.

How to uninstall YAC (Yet Another Cleaner)

1. Access Windows Start Menu and navigate to the Control Panel.

Uninstall a program

2. Click Uninstall a program or Add and remove a program.

3. In the list of installed programs, search for YAC (Elex do Brasil Participações Ltda) and other potentially unwanted software. Once located, double click the unwanted programs or highlight them in the list and click the Uninstall button.

It is important to stay alert when uninstalling YAC as the process may be difficult. If a prompt appears, click Uninstall YAC, then click the Uninstall button, then choose a reason for uninstalling the malware, and click the new Uninstall button.

Some versions of YAC software do now show buttons when uninstalling the software. If this is the case, viewers have suggested to use the video below as a guideline in order to click the screen in the appropriate locations to perform the appropiate tasks to remove this pesky software.

Related Articles & Troubleshooting

In some cases YAC malware will reinstall itself. If this is the case there are several options to remove Yet Another Cleaner listed below, as well as instructions to remove similar rogue software.

This site’s original source is the following:

How to remove the YAC virus – Removal Guide Yet Another Cleaner | Malware Removal – Software & Tutorials.

Posted in: Latest Computer News

Leave a Comment (0) →

‘Operation Hangover’ hackers exploit latest Windows zero-day – Computerworld

‘Operation Hangover’ hackers exploit latest Windows zero-day

Indian gang ups its game with targeted attacks that rely on malicious Word docs

By Gregg Keizer

November 7, 2013 10:47 AM ET

1 CommentinShare4

Computerworld – The unpatched vulnerability in Windows that Microsoft acknowledged on Tuesday has been used by a known Indian hacker group responsible for earlier "Operation Hangover" attacks, security company Symantec said yesterday.

The gang behind Operation Hangover is believed to be based in India, and the bulk of the first round of cyber-espionage attacks, which were discovered in May, were aimed at its neighbor and long-time adversary Pakistan.

"After analyzing the payloads being used in this attack, we have identified that the targeted emails are part of an attack campaign known as Operation Hangover," Symantec said in a blog, referring to the newest campaign that relies on the Microsoft zero-day vulnerability to hijack and infect Windows PCs.

Microsoft issued a security alert Tuesday, saying that a vulnerability in the TIFF image-format parsing component of Windows was being exploited in attacks aimed at targets in the Middle East and South Asia, the latter region representing countries like India and Pakistan.

The attacks Symantec captured used malicious Word documents attached to emails with subject headings such as "Illegal Authorization for Funds Transfer" and "Problem with Credit September 26th 2013."

It was the first time that the Hangover group has used a zero-day vulnerability in its attacks, Symantec said.

Researcher Haifei Li of security company McAfee was the first to find and report the unpatched bug to Microsoft. The Redmond, Wash., company’s security team was alerted of the vulnerability Oct. 31.

According to Li, the exploit uses multiple XML objects to "spray the heap memory," a technique more than a decade old, to uncover sections of memory suitable for use by the actual attack code.

"It is worth [noting] that this heap-spraying in Office via ActiveX objects is a new exploitation trick which we [haven’t] seen before," Li wrote earlier this week.

Microsoft’s own researchers confirmed the ActiveX-based head-spray tactic in a detailed description published on its Security Research & Defense blog Tuesday.

This article, ‘Operation Hangover’ hackers exploit latest Windows zero-day, was originally published at Computerworld.com.

via 'Operation Hangover' hackers exploit latest Windows zero-day – Computerworld.

Posted in: Latest Computer News

Leave a Comment (0) →

How to Diagnose a Computer Problem: 10 Quick Steps

computer diagnosis

How to Diagnose a Computer Problem
Edited by Cameron, Brandywine, R1zen187, Username152 and 11 others

Many people are faced with everyday computer problems that are easy to fix, but are unable to diagnose the actual problem. While there are many problems a computer will be faced with, this article will tell you where to look for common problems.

EditSteps
1Check the POST. POST stands for Power On Self Test. This is generally the first or second thing that appears on a computer after turning on the power. This appears before the operating system begins to load. The POST will display any problems found with hardware that makes the computer unable to boot, POST may also display problems with hardware that allow the computer to boot, but not operate at its full capacity during operation.

2Notice the load time of the OS (operating system). A longer than usual load time may indicate seek errors (or other errors) in the hard drive.
3Notice any graphics problems once the OS has loaded. Reduced graphics may indicate driver failures or hardware failures with graphic cards.
4Perform an auditory test. An auditory test is an unorthodox, but still effective way of judging how hard a computer is working. With the computer on and running, play any decent length audio file (usually above 30 secs). If the audio is choppy or slow, it usually means that the processor is working at an elevated level, or there is not enough RAM to run all programs loading. Changing the startup sound is a great way to apply this test. Another issue associated with choppy sounds is PIO (Programmed Input/Output) Mode. This affects how the hard drive reads and writes data from a drive. Switching to DMA allows for faster reads and writes, and can sometimes repair choppy audio.
5Check any newly installed hardware. Many operating systems, especially Windows, can conflict with new drivers. The driver may be badly written, or it may conflict with another process. Windows will usually notify you about devices that are causing a problem, or have a problem. To check this use the Device Manager, this can be accessed by entering the Control Panel, clicking the System icon, clicking the Hardware tab, and clicking on Device Manager. Use this to check and arrange the properties of hardware.
6Check any newly installed software. Software may require more resources than the system can provide. Chances are that if a problem begins after software starts, the software is causing it. If the problem appears directly upon startup, it may be caused by software that starts automatically on boot.
7Check RAM and CPU consumption. A common problem is a choppy or sluggish system. If a system is choppy it is good practice to see if a program is consuming more resources than the computer can provide. An easy way to check this is to use the Task Manager, right click on the taskbar select Task Manager, and click the Processes tab. The CPU column contains a number that indicates the percentage of CPU the process is consuming. The Mem Usage column indicates how much memory a process is consuming.
8Listen to the computer, if the hard drive is scratching or making loud noises, shut off the computer and have a professional diagnose the hard drive. Listen to the CPU fan, this comes on a high speed when the CPU is working hard, and can tell you when the computer is working beyond its capacity.
9Run a virus and malware scan. Performance problems can be caused by malware on the computer. Running a virus scan can unearth any problems. Use a commonly updated virus scanner (such as Norton Antivirus or Avast! Antivirus) and a commonly updated malware scanner (such as Spybot Search & Destroy).
10Check for the problem in safe mode. As a last ditch effort, check the problem in safe mode. To enter safe mode, tap F8 repeatedly during POST (this works on most systems). If the problem persists in safe mode, it is a fair bet that the operating system itself is to blame.

This article was taken from the following site: http://www.wikihow.com/Diagnose-a-Computer-Problem

Posted in: Latest Computer News

Leave a Comment (0) →

Ubuntu 13.10 Review: A great Linux desktop gets better | ZDNet

MUST READ: Ubuntu 13.10 Review: A great Linux desktop gets betterTopic: Ubuntu Compare Follow via: RSSEmail Alert98Comments17 Votes19inSharemore +Ubuntu 13.10 Review: A great Linux desktop gets betterSummary: Ubuntu 13.10 may not be the most exciting desktop Linux, but it is very solid and contains many useful new features.By Steven J. Vaughan-Nichols for Linux and Open Source | October 10, 2013 — 17:47 GMT 10:47 PDTMany hardcore desktop fans still havent forgiven Ubuntu for switching to its Unity interface. Others dislike how Canonical, Ubuntus parent company, has gone its own way with such technical issues as working on the Mir display stack instead of the more mainstream Wayland. And, some people dislike how Ubuntu is combining "local" searches with Web searches. So what!Ubuntu 13.10 launches next week. Heres an early review.Heres all that really matters. Back in April 2011, Ubuntus founder, Mark Shuttleworth said that the purpose of Ubuntus new path was "to bring the joys and freedoms and innovation and performance and security that have always been part of the Linux platform, to a consumer audience."  Hes done it.Sure, Ubuntu 13.10 Saucy Salamander, which has just gone into its final release candidate stage, isnt a desktop Linux that a Linux techie who still compiles his or her kernels from source code can love. But, its not meant to be that kind of desktop.See SlideshowUbuntu 13.10: A desktop tourRead moreIts meant to be a Linux desktop that anyone, say my now 81-year old mother-in-law can use. From that standpoint Ubuntu has been a success and this one week from final release version is even more of a win for people who just want to use a computer without tears.To see how it was doing this time, Ive been running the Ubuntu beta and the release candidate on two test systems. The first test box was my 2007 Dell Inspiron 530S, which is powered by a 2.2-GHz Intel Pentium E2200 dual-core processor. This PC has 4GBs of RAM, a 500GB SATA Serial ATA drive, and an Integrated Intel 3100 GMA Graphics Media Accelerator chip set. The second was a 2008-vintage Gateway DX4710. This PC is powered by a 2.5-GHz Intel Core 2 Quad processor, 6GBs of RAM, a 1TB SATA drive, and an Intel GMA 3100 for graphics.Installation was a cinch on all these systems. While I didnt try to install Ubuntu on a system locked down with Windows 8 Secure Boot, there are good instructions on how to put Ubuntu on Windows 8 PCs and other systems that use Unified Extensible Firmware Interface UEFI.One nice new feature about the installation is that during it, youre asked to either login or open a free Ubuntu One cloud service account. Ubuntu One is a Dropbox-like storage service which comes with 5GBs of no-cost storage. The commercial version, at $39.95, gives you 20GBs of storage and music streaming. While this service works hand-in-glove with Ubuntu you can also its storage from Windows, Mac OS, Android and iOS.The first thing I noticed once I had it installed was that on both of these older systems, Ubuntu 13.10 ran like a top. If you have an older PC of your own and youre concerned about its fast approaching XP expiration date, keep in mind that Ubuntu, and other easy-to-use Linux distributions such as Mint run just fine on hardware that Windows 7 and above might find too slow.Looking under the hood, heres what I found. First, the Saucy Salamander is running the Linux 3.11 kernel.

via Ubuntu 13.10 Review: A great Linux desktop gets better | ZDNet.

Ubuntu

Posted in: Latest Computer News

Leave a Comment (0) →

5 tips to keep you cyber-safe this buying season | Computerworld Blogs

5 tips to keep you cyber-safe this buying season

By David A. Milman
November 30, 2010 10:35 AM EST

5 tips to keep you cyber-safe this buying season | Computerworld Blogs

Black Friday and Cyber Monday may mark the high points of the holiday shopping season, but they are by no means the end of it.  In a still struggling economy, with everyone searching for value, consumers will encounter technology deals that might seem too good to be true.

As reported by the Dow Jones newswires, online shopping may well top $1 billion dollars on a single day this year.  With more and more consumers willing to spend money online, sales will rise, but so will the risk of exposure to some sort of scam or cyber-crime right alongside those fabulous deals.

So, how can you avoid being taken advantage of?

There are many ways to keep yourself, your privacy, and your money safe this holiday season.  But, as the countdown to Christmas grows shorter, many of us abandon our common sense in the desperate pursuit of that one great gift or that one fantastic deal.

Therein lies the problem.  The number one way to guard against online scams is to employ some common sense.

For example, many of us will go to extreme lengths to save a few dollars.  This often includes venturing off the ‘beaten path’ and looking outside the major retailers on online auction or classified sites such as E-Bay or Craigslist, which the Better Business Bureau has cautioned against.  While many of the deals offered on such sites are perfectly legitimate, the likelihood of stumbling into a scam is far greater on these sorts of sites.

Tip #1 — If a deal seems too greatit probably is, especially if it’s from an individual user or a ‘minor’ retailer.  Be suspicious of any deal or sale that you can’t believe is real.  Maybe you’ve found the best buy of the season, but it’s more likely that you’ve stumbled into a scam set up to defraud you and steal your money or information.

It’s also important to remember that anyone you do business with online knows more about Internet commerce — and its dangers — than you do.

An excellent tip #2 is to do some research about any online vendor you’re considering making a purchase from.  Some vendors believe quality customer service goes hand in hand with turning a profit.  Others, however, such asVitaly Borker, seem to value their bottom line over the satisfaction of their customers.

As reported in the New York Times and on Cnet.com, Borker took advantage of loopholes in credit card policies to refuse refunds and threaten customers.  Only when he was in danger of being cut off by Visa and MasterCard did Borker begin meeting his customer’s needs.

Some simple research might have tipped customers off that Borker’s website was one to be avoided.

As heinous as Borker’s actions may seem, they do bring to light tip #3 for the online shopper: understand your credit cards.  Borker and other merchants like him, were able to take advantage of customers because of the rules set up by the credit cards those customers use.

With credit card purchases being the dominant form of online shopping, it’s vital that consumers know the policies of the cards they use and what recourse they have should those policies be abused.

Tip #4 — Consumers would also be wise to investigate other forms of payment, such as PayPal or Bill Me Later, a PayPal service.  While alternative methods may not offer the convenience of credit cards, they may provide more security against potential scams and those who know how to abuse the system.

Regardless of where and when you shop online, tip #5 applies: be cautious.  The Internet can be a dangerous place at the best of times.  During the often stressful and expensive holiday season the dangers increase exponentially.

Be wary every time you shop online and help to make sure this time remains a time of giving, and not of taking.

This article was cited from: http://blogs.computerworld.com/17440/safe_cyber_shopping_tips_for_the_holiday_season 

David A. Milman, Founder and CEO of Rescuecom

 

Posted in: Latest Computer News

Leave a Comment (0) →

When is it the Right Time to Upgrade Your PC?

When is the Right Time to Upgrade Your PC? - Chris Pirillo

Do you upgrade your computer yearly? How about monthly? Do you upgrade only when your current system breaks down or stops running the newest applications? There is a big debate among computer users as to when the best, and most cost-effective time is to upgrade. In a recent discussion, Brandon and Jake were asked the question, “When is it time to upgrade your PC?”

Brandon believes in upgrading your system components, rather than buying a new computer every time new technology becomes available. By keeping track of when Intel and/or AMD come out with a new socket, he is able to determine whether or not a new motherboard needs to be purchased when buying a new processor.

Jake, on the other hand, buys an entirely new system yearly. By doing this, he enjoys an entire set of updated features including bigger hard drives, newer optical drive technology, and faster processing without the hassle of having to buy new individual pieces.

For most users, a simple upgrade here and there to a desktop PC on a regular basis can be enough to for them to get by for years. Costs are relatively low in comparison, and you have more ability to get exactly what you need, rather than what the OEM is willing to include.

A gamer might find a yearly total upgrade more cost-effective given the somewhat low prices for bundled hardware available today. Video cards, RAM, CPU, Motherboards, and sound cards all fall under a serious gamer’s radar in terms of desired performance increase.

While there are certain advantages to each camp in this seemingly eternal debate between geeks, one thing mostly everyone can agree on is that maintaining a basic knowledge of current technologies can come in handy when it does come time to pick up new hardware. Knowing the advantages to SSD over a traditional drive can help determine whether or not the investment is ultimately worthwhile.

If you decide to upgrade components rather than an entire system, keep in mind that everything needs to be compatible. Buying a SATA drive for a motherboard that only supports older connections can cause a real headache as users discover the incompatibility. More modern PC memory may not be recognized or run properly in an older motherboard. An out-of-date BIOS can fail to recognize newer components entirely, which may result in the appearance of broken hardware when a simple update can resolve the problem entirely.

What do you think? When is it time to upgrade your PC? Please leave a comment below with your opinion on the topic.

This article was found at the following:  When is the Right Time to Upgrade Your PC? – Chris Pirillo.

Posted in: Latest Computer News

Leave a Comment (0) →