Javascript Virus

I think i HAVE SOME KIND OF JAVASCRPIT VIRUS ON MY COMPUTER!! MY JAVA WILL NOT WORK WHATSOEVER!!!EVERYTIME I TRY TO OPEN SOMETHING, IT WILL NOT LET ME!! I CAN'T EVEN OPEN MY OWN E-MAIL!!! I CAN'T DOWNLOAD ANYTHING AT ALL!! PLEASE SOMEONE TELL ME WHAT TO DO!!
[email protected]
865.806.7376

yeah that is what I would do I would try to do what sue said and if that dont work I would do what hamebone said and if that dont help I would do a virus scan and if you dont have a virus scanner now would be a good time to go buy one

Similar Messages

  • How to deal with a Javascript virus on my Macbook?

    I stupidly downloaded a javascript software which also allowed a virus onto my computer so now there's constantly pop-ups and windows opening onto random websites and advertisements all over ever site I'm on. I don't know what to do or if there's a way to get rid of the virus. Please help.
    Macbook Pro 13" with Retina Display

    Click here and follow the instructions, or if desired, run Adware Medic; the second link is a direct download.
    (115561)

  • This doesn't have to do with an ipod but it is very important

    When I go on iphoto, several of my pictures don't show up. I can see them in the menu but when I click on them, a large exclamation point is in their place. I can't edit them or view them in a slideshow. Also, i've noticed that when I log into myspace, some of the ads are replaced by codes. Does this mean I have a virus????

    That is strange. In iPhoto select one with the problem and open properties, usually it will tell you that the file is not found and asks if you want to locate it, but if as you say, the file is there, then perhaps a different error message appears.
    On the myspace subject, the short answer is yes, there could be a virus on one of their pages or files. They post advisories when one is found, in fact the "code" you reported seeing could be a disarmed virus (they blocked some javascript virus and the end result is invalid code that just shows in your browser).
    When it comes to virus things are too general, there's always the possibility that somebody can come up with a new one, find new ways to spread it, etc. One can only be careful and try not to download suspicious files, and even more careful about executing (double click) them.

  • Acrobat X  stopped working on Windows 8 platform-not part of CS6

    I am running Acrobat 10 on a Windows 8 operating system. Acrobat worked fine for the past few months with no issues.
    Today I saved a file from the internet then closed Acrobat and opened a few additional files with no issue. Then I tried to open another file and it appeared for a brief second then the program just closed. Since then I can't open any files. All that happens is you see the "busy" round circle for a few seconds when I try to open the program and nothing happens.
    Any suggestions? I have no idea what happened.

    It sounds like the PDF you downloaded may have had a JavaScript virus. I would run it through a virus checker. In the meantime, go to the Control Panel and under Programs and Preferences run a repair on Acrobat. You might also want to check the plugins subfolder to see if something was downloaded about that same time and put in that folder. If the repair does not do the job, then you may unfortunately have to uninstall. In that case, totally delete the Acrobat folder where the program was installed after the uninstall. The run the cleaner from http://labs.adobe.com/downloads/acrobatcleaner.html, reboot, and reinstall. You will then have to go through the update process again, particularly if the system is a 64-bit system.

  • Javascript Problems with Viruses

    Our IT department has been posting bulletins, company-wide about not allowing Javascript to run in PDFs. Does anyone know how that will impact forms/form execution in forms created using Acrobat 8? I got a really good book on forms, and was all set to go, but now I'm not sure if it's worth the trouble. Thanks

    Has your IT function posted the links to the patch or updated Acrobat/Reader with the latest updates that fix the latest problem for version s 7-9?
    Adobe has acknowledged the problem and fixed it. As noted in the initial reports, this vulnerability is rare in the real world. And Acrobat/Reader JavaScript has very few exits outside of Acrobat/Reader, unlike the OS JavaScript. One should also look at all the functions within Acrobat JavaScript that have been restricted due to possible privacy and security vulnerabilities like no silent printing or quite saving. MicroSoft and web browser providers should be so responsive.

  • Photoshop CC 2014 can't find JavaScript plug-in for Photomerge

    Hello,
    I'm trying to use the Photomerge tool in Photoshop CC 2014 on my computer (Windows 7, 64-bit) and am getting an error that says "Could not complete the Photomerge command because Photoshop was unable to find the JavaScript plug-in." The same thing happens with Lens Correction and Merge to HDR Pro. I have the most recent update of Photoshop CC 2014.
    Per other suggestions in these forums about this issue, I have tried:
    Turning off my virus protection in case it was preventing the program from accessing the scripts per this tip
    Downloading and following the instructions on Adobe's site here to copy an additional Scripting folder to my Photoshop program folder
    Uninstalling and reinstalling the program, followed by a system reboot
    Talking to Adobe customer support (who tried to solve the problem for well over an hour and also uninstalled and reinstalled the program)
    It looks like the Photomerge file is in the right place (C:\Program Files\Adobe\Adobe Photoshop CC 2014\Presets\Scripts):
    And so I am now out of ideas on how to fix this. Anyone have any suggestions?
    Thanks!

    Here is my menu Help>System Info....  for my working windows CC 2014 check it with yours check the plugin section and try removing any third party plug-ins they may interfear????
    Adobe Photoshop Version: 2014.1.0 20140730.r.148 2014/07/30:23:59:59  x64
    Operating System: Windows 7 64-bit
    Version: 6.1 Service Pack 1
    System architecture: Intel CPU Family:6, Model:13, Stepping:7 with MMX, SSE Integer, SSE FP, SSE2, SSE3, SSE4.1, SSE4.2, AVX, HyperThreading
    Physical processor count: 12
    Logical processor count: 24
    Processor speed: 1995 MHz
    Built-in memory: 40886 MB
    Free memory: 33838 MB
    Memory available to Photoshop: 37131 MB
    Memory used by Photoshop: 94 %
    3D Multitone Printing: Disabled.
    Touch Gestures: Disabled.
    Windows 2x UI: Disabled.
    Image tile size: 1024K
    Image cache levels: 4
    Font Preview: Huge
    TextComposer: Latin
    Display: 1
    Display Bounds: top=0, left=0, bottom=1080, right=1920
    Display: 2
    Display Bounds: top=0, left=-1360, bottom=768, right=0
    OpenGL Drawing: Enabled.
    OpenGL Allow Old GPUs: Not Detected.
    OpenGL Drawing Mode: Advanced
    OpenGL Allow Normal Mode: True.
    OpenGL Allow Advanced Mode: True.
    AIFCoreInitialized=1
    AIFOGLInitialized=1
    OGLContextCreated=1
    NumGLGPUs=1
    NumCLGPUs=1
    glgpu[0].GLVersion="3.0"
    glgpu[0].GLMemoryMB=2048
    glgpu[0].GLName="Quadro 4000/PCIe/SSE2"
    glgpu[0].GLVendor="NVIDIA Corporation"
    glgpu[0].GLVendorID=4318
    glgpu[0].GLDriverVersion="9.18.13.4052"
    glgpu[0].GLRectTextureSize=16384
    glgpu[0].GLRenderer="Quadro 4000/PCIe/SSE2"
    glgpu[0].GLRendererID=1757
    glgpu[0].HasGLNPOTSupport=1
    glgpu[0].GLDriver="nvd3dumx.dll,nvwgf2umx.dll,nvwgf2umx.dll,nvd3dum,nvwgf2um,nvwgf2um"
    glgpu[0].GLDriverDate="20140702000000.000000-000"
    glgpu[0].CanCompileProgramGLSL=1
    glgpu[0].GLFrameBufferOK=1
    glgpu[0].glGetString[GL_SHADING_LANGUAGE_VERSION]="4.40 NVIDIA via Cg compiler"
    glgpu[0].glGetProgramivARB[GL_FRAGMENT_PROGRAM_ARB][GL_MAX_PROGRAM_INSTRUCTIONS_ARB]=[6553 6]
    glgpu[0].glGetIntegerv[GL_MAX_TEXTURE_UNITS]=[4]
    glgpu[0].glGetIntegerv[GL_MAX_COMBINED_TEXTURE_IMAGE_UNITS]=[192]
    glgpu[0].glGetIntegerv[GL_MAX_VERTEX_TEXTURE_IMAGE_UNITS]=[32]
    glgpu[0].glGetIntegerv[GL_MAX_TEXTURE_IMAGE_UNITS]=[32]
    glgpu[0].glGetIntegerv[GL_MAX_DRAW_BUFFERS]=[8]
    glgpu[0].glGetIntegerv[GL_MAX_VERTEX_UNIFORM_COMPONENTS]=[4096]
    glgpu[0].glGetIntegerv[GL_MAX_FRAGMENT_UNIFORM_COMPONENTS]=[4096]
    glgpu[0].glGetIntegerv[GL_MAX_VARYING_FLOATS]=[124]
    glgpu[0].glGetIntegerv[GL_MAX_VERTEX_ATTRIBS]=[16]
    glgpu[0].extension[AIF::OGL::GL_ARB_VERTEX_PROGRAM]=1
    glgpu[0].extension[AIF::OGL::GL_ARB_FRAGMENT_PROGRAM]=1
    glgpu[0].extension[AIF::OGL::GL_ARB_VERTEX_SHADER]=1
    glgpu[0].extension[AIF::OGL::GL_ARB_FRAGMENT_SHADER]=1
    glgpu[0].extension[AIF::OGL::GL_EXT_FRAMEBUFFER_OBJECT]=1
    glgpu[0].extension[AIF::OGL::GL_ARB_TEXTURE_RECTANGLE]=1
    glgpu[0].extension[AIF::OGL::GL_ARB_TEXTURE_FLOAT]=1
    glgpu[0].extension[AIF::OGL::GL_ARB_OCCLUSION_QUERY]=1
    glgpu[0].extension[AIF::OGL::GL_ARB_VERTEX_BUFFER_OBJECT]=1
    glgpu[0].extension[AIF::OGL::GL_ARB_SHADER_TEXTURE_LOD]=1
    clgpu[0].CLPlatformVersion="1.1"
    clgpu[0].CLDeviceVersion="1.1 CUDA"
    clgpu[0].CLMemoryMB=2048
    clgpu[0].CLName="Quadro 4000"
    clgpu[0].CLVendor="NVIDIA Corporation"
    clgpu[0].CLVendorID=4318
    clgpu[0].CLDriverVersion="340.52"
    clgpu[0].CUDASupported=1
    clgpu[0].CUDAVersion="6.5.12"
    clgpu[0].CLBandwidth=7.49529e+010
    clgpu[0].CLCompute=185.348
    License Type: Subscription
    Serial number: 96040035116912554961
    Application folder: C:\Program Files\Adobe\Adobe Photoshop CC 2014\
    Temporary file path: C:\Users\JOHNJM~1\AppData\Local\Temp\
    Photoshop scratch has async I/O enabled
    Scratch volume(s):
      F:\, 465.2G, 166.4G free
      C:\, 224.2G, 98.6G free
    Required Plug-ins folder: C:\Program Files\Adobe\Adobe Photoshop CC 2014\Required\Plug-Ins\
    Primary Plug-ins folder: C:\Program Files\Adobe\Adobe Photoshop CC 2014\Plug-ins\
    Installed components:
       A3DLIBS.dll   A3DLIB Dynamic Link Library   9.2.0.112  
       ACE.dll   ACE 2014/04/14-23:42:44   79.554120   79.554120
       adbeape.dll   Adobe APE 2013/02/04-09:52:32   0.1160850   0.1160850
       AdbePM.dll   PatchMatch 2014/04/23-10:46:55   79.554276   79.554276
       AdobeLinguistic.dll   Adobe Linguisitc Library   8.0.0  
       AdobeOwl.dll   Adobe Owl 2014/03/05-14:49:37   5.0.33   79.552883
       AdobePDFL.dll   PDFL 2014/03/04-00:39:42   79.510482   79.510482
       AdobePIP.dll   Adobe Product Improvement Program   7.2.1.3399  
       AdobeXMP.dll   Adobe XMP Core 2014/01/13-19:44:00   79.155772   79.155772
       AdobeXMPFiles.dll   Adobe XMP Files 2014/01/13-19:44:00   79.155772   79.155772
       AdobeXMPScript.dll   Adobe XMP Script 2014/01/13-19:44:00   79.155772   79.155772
       adobe_caps.dll   Adobe CAPS   8,0,0,13  
       AGM.dll   AGM 2014/04/14-23:42:44   79.554120   79.554120
       ahclient.dll    AdobeHelp Dynamic Link Library   1,8,0,31  
       amtlib.dll   AMTLib (64 Bit)   8.0.0.91 BuildVersion: 8.0; BuildDate: Tue May 27 2014 22:3:7)   1.000000
       ARE.dll   ARE 2014/04/14-23:42:44   79.554120   79.554120
       AXE8SharedExpat.dll   AXE8SharedExpat 2013/12/20-21:40:29   79.551013   79.551013
       AXEDOMCore.dll   AXEDOMCore 2013/12/20-21:40:29   79.551013   79.551013
       Bib.dll   BIB 2014/04/14-23:42:44   79.554120   79.554120
       BIBUtils.dll   BIBUtils 2014/04/14-23:42:44   79.554120   79.554120
       boost_date_time.dll   photoshopdva   8.0.0  
       boost_signals.dll   photoshopdva   8.0.0  
       boost_system.dll   photoshopdva   8.0.0  
       boost_threads.dll   photoshopdva   8.0.0  
       cg.dll   NVIDIA Cg Runtime   3.0.00007  
       cgGL.dll   NVIDIA Cg Runtime   3.0.00007  
       CIT.dll   Adobe CIT   2.2.6.32411   2.2.6.32411
       CITThreading.dll   Adobe CITThreading   2.2.6.32411   2.2.6.32411
       CoolType.dll   CoolType 2014/04/14-23:42:44   79.554120   79.554120
       dvaaudiodevice.dll   photoshopdva   8.0.0  
       dvacore.dll   photoshopdva   8.0.0  
       dvamarshal.dll   photoshopdva   8.0.0  
       dvamediatypes.dll   photoshopdva   8.0.0  
       dvametadata.dll   photoshopdva   8.0.0  
       dvametadataapi.dll   photoshopdva   8.0.0  
       dvametadataui.dll   photoshopdva   8.0.0  
       dvaplayer.dll   photoshopdva   8.0.0  
       dvatransport.dll   photoshopdva   8.0.0  
       dvaui.dll   photoshopdva   8.0.0  
       dvaunittesting.dll   photoshopdva   8.0.0  
       dynamiclink.dll   photoshopdva   8.0.0  
       ExtendScript.dll   ExtendScript 2014/01/21-23:58:55   79.551519   79.551519
       icucnv40.dll   International Components for Unicode 2013/02/25-15:59:15    Build gtlib_4.0.19090  
       icudt40.dll   International Components for Unicode 2013/02/25-15:59:15    Build gtlib_4.0.19090  
       igestep30.dll   IGES Reader   9.3.0.113  
       imslib.dll   IMSLib DLL   7.0.0.145  
       JP2KLib.dll   JP2KLib 2014/03/12-08:53:44   79.252744   79.252744
       libifcoremd.dll   Intel(r) Visual Fortran Compiler   10.0 (Update A)  
       libiomp5md.dll   Intel(R) OpenMP* Runtime Library   5.0  
       libmmd.dll   Intel(r) C Compiler, Intel(r) C++ Compiler, Intel(r) Fortran Compiler   12.0  
       LogSession.dll   LogSession   7.2.1.3399  
       mediacoreif.dll   photoshopdva   8.0.0  
       MPS.dll   MPS 2014/03/25-23:41:34   79.553444   79.553444
       pdfsettings.dll   Adobe PDFSettings   1.04  
       Photoshop.dll   Adobe Photoshop CC 2014   15.1  
       Plugin.dll   Adobe Photoshop CC 2014   15.1  
       PlugPlugExternalObject.dll   Adobe(R) CEP PlugPlugExternalObject Standard Dll (64 bit)   5.0.0  
       PlugPlugOwl.dll   Adobe(R) CSXS PlugPlugOwl Standard Dll (64 bit)   5.0.0.74  
       PSArt.dll   Adobe Photoshop CC 2014   15.1  
       PSViews.dll   Adobe Photoshop CC 2014   15.1  
       SCCore.dll   ScCore 2014/01/21-23:58:55   79.551519   79.551519
       ScriptUIFlex.dll   ScriptUIFlex 2014/01/20-22:42:05   79.550992   79.550992
       svml_dispmd.dll   Intel(r) C Compiler, Intel(r) C++ Compiler, Intel(r) Fortran Compiler   12.0  
       tbb.dll   Intel(R) Threading Building Blocks for Windows   4, 2, 2013, 1114  
       tbbmalloc.dll   Intel(R) Threading Building Blocks for Windows   4, 2, 2013, 1114  
       TfFontMgr.dll   FontMgr   9.3.0.113  
       TfKernel.dll   Kernel   9.3.0.113  
       TFKGEOM.dll   Kernel Geom   9.3.0.113  
       TFUGEOM.dll   Adobe, UGeom©   9.3.0.113  
       updaternotifications.dll   Adobe Updater Notifications Library   8.0.0.14 (BuildVersion: 1.0; BuildDate: BUILDDATETIME)   8.0.0.14
       VulcanControl.dll   Vulcan Application Control Library   5.0.0.82  
       VulcanMessage5.dll   Vulcan Message Library   5.0.0.82  
       WRServices.dll   WRServices Fri Mar 07 2014 15:33:10   Build 0.20204   0.20204
       wu3d.dll   U3D Writer   9.3.0.113  
    Required plug-ins:
       3D Studio 15.1 (2014.1.0 x001)
       Accented Edges 15.1
       Adaptive Wide Angle 15.1
       Angled Strokes 15.1
       Average 15.1 (2014.1.0 x001)
       Bas Relief 15.1
       BMP 15.1
       Camera Raw 8.6
       Camera Raw Filter 8.6
       Chalk & Charcoal 15.1
       Charcoal 15.1
       Chrome 15.1
       Cineon 15.1 (2014.1.0 x001)
       Clouds 15.1 (2014.1.0 x001)
       Collada 15.1 (2014.1.0 x001)
       Color Halftone 15.1
       Colored Pencil 15.1
       CompuServe GIF 15.1
       Conté Crayon 15.1
       Craquelure 15.1
       Crop and Straighten Photos 15.1 (2014.1.0 x001)
       Crop and Straighten Photos Filter 15.1
       Crosshatch 15.1
       Crystallize 15.1
       Cutout 15.1
       Dark Strokes 15.1
       De-Interlace 15.1
       Dicom 15.1
       Difference Clouds 15.1 (2014.1.0 x001)
       Diffuse Glow 15.1
       Displace 15.1
       Dry Brush 15.1
       Eazel Acquire 15.1 (2014.1.0 x001)
       Embed Watermark 4.0
       Entropy 15.1 (2014.1.0 x001)
       Export Color Lookup NO VERSION
       Extrude 15.1
       FastCore Routines 15.1 (2014.1.0 x001)
       Fibers 15.1
       Film Grain 15.1
       Filter Gallery 15.1
       Flash 3D 15.1 (2014.1.0 x001)
       Fresco 15.1
       Glass 15.1
       Glowing Edges 15.1
       Google Earth 4 15.1 (2014.1.0 x001)
       Grain 15.1
       Graphic Pen 15.1
       Halftone Pattern 15.1
       HDRMergeUI 15.1
       IFF Format 15.1
       IGES 15.1 (2014.1.0 x001)
       Ink Outlines 15.1
       JPEG 2000 15.1
       Kurtosis 15.1 (2014.1.0 x001)
       Lens Blur 15.1
       Lens Correction 15.1
       Lens Flare 15.1
       Liquify 15.1
       Matlab Operation 15.1 (2014.1.0 x001)
       Maximum 15.1 (2014.1.0 x001)
       Mean 15.1 (2014.1.0 x001)
       Measurement Core 15.1 (2014.1.0 x001)
       Median 15.1 (2014.1.0 x001)
       Mezzotint 15.1
       Minimum 15.1 (2014.1.0 x001)
       MMXCore Routines 15.1 (2014.1.0 x001)
       Mosaic Tiles 15.1
       Multiprocessor Support 15.1 (2014.1.0 x001)
       Neon Glow 15.1
       Note Paper 15.1
       NTSC Colors 15.1 (2014.1.0 x001)
       Ocean Ripple 15.1
       OpenEXR 15.1
       Paint Daubs 15.1
       Palette Knife 15.1
       Patchwork 15.1
       Paths to Illustrator 15.1
       PCX 15.1 (2014.1.0 x001)
       Photocopy 15.1
       Photoshop 3D Engine 15.1 (2014.1.0 x001)
       Photoshop Touch 14.0
       Picture Package Filter 15.1 (2014.1.0 x001)
       Pinch 15.1
       Pixar 15.1 (2014.1.0 x001)
       Plaster 15.1
       Plastic Wrap 15.1
       PLY 15.1 (2014.1.0 x001)
       PNG 15.1
       Pointillize 15.1
       Polar Coordinates 15.1
       Portable Bit Map 15.1 (2014.1.0 x001)
       Poster Edges 15.1
       Radial Blur 15.1
       Radiance 15.1 (2014.1.0 x001)
       Range 15.1 (2014.1.0 x001)
       Read Watermark 4.0
       Render Color Lookup Grid NO VERSION
       Reticulation 15.1
       Ripple 15.1
       Rough Pastels 15.1
       Save for Web 15.1
       ScriptingSupport 15.1
       Shake Reduction 15.1
       Shear 15.1
       Skewness 15.1 (2014.1.0 x001)
       Smart Blur 15.1
       Smudge Stick 15.1
       Solarize 15.1 (2014.1.0 x001)
       Spatter 15.1
       Spherize 15.1
       Sponge 15.1
       Sprayed Strokes 15.1
       Stained Glass 15.1
       Stamp 15.1
       Standard Deviation 15.1 (2014.1.0 x001)
       STL 15.1 (2014.1.0 x001)
       Sumi-e 15.1
       Summation 15.1 (2014.1.0 x001)
       Targa 15.1
       Texturizer 15.1
       Tiles 15.1
       Torn Edges 15.1
       Twirl 15.1
       U3D 15.1 (2014.1.0 x001)
       Underpainting 15.1
       Vanishing Point 15.1
       Variance 15.1 (2014.1.0 x001)
       Virtual Reality Modeling Language | VRML 15.1 (2014.1.0 x001)
       Water Paper 15.1
       Watercolor 15.1
       Wave 15.1
       Wavefront|OBJ 15.1 (2014.1.0 x001)
       WIA Support 15.1 (2014.1.0 x001)
       Wind 15.1
       Wireless Bitmap 15.1 (2014.1.0 x001)
       ZigZag 15.1
    Optional and third party plug-ins:
       CUR (Windows Cursor) NO VERSION
       Face Control II 2.00
       Fine Touch 3.25
       GREYCstoration NO VERSION
       ICO (Windows Icon) NO VERSION
       Reduce Noise 7.0.0.0
       ScriptListener 13.0
       StarFilter Pro 3 3.0.5.1
       SuperPNG 2.0
    Plug-ins that failed to load: NONE
    Flash: NONE
    Installed TWAIN devices: NONE

  • Pop-Up Virus

    Just wondering if anyone can help me, I have only recently purchased my new mac. I was concerned when I didn't need any form of virus protection, so I downloaded Avasti and it had been working fine. Recently (past 6 weeks) three stranges pop-ups have been appearing, even though I have my 'pop up' block on. The first one which appears most commonly, is the one found in the top picture. This grey box saying download manager update only appears when I open google. The secod one appears on most webpages which I open, and it is the little green box pictured in the lower left of the screen, with the option to hide ad. And lastly, a random screen pops up offering businesses and bonuses which I have never even heard of.
    Please if you know how to delete or get rid of this virus can you please let me know ASAP!

    "Avast" is perhaps the worst of the whole wretched lot of commercial "security" products for the Mac. Not only does it fail to protect you from any real danger, it throws false warnings, destabilizes and slows down your computer, and sometimes or always corrupts the network settings and the permissions of files in your home folder. Removing it may not repair all the damage, and neither will Disk Utility or even reinstalling OS X.
    Back up all data, then remove "Avast" according to the developer's instructions. Restart.
    If you tried to remove Avast by dragging an application to the Trash, you'll have to reinstall it and then follow the instructions linked above.
    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to your computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
       For the reasons given, App Store products, and — to a lesser extent — other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    Software of any kind is distributed via BitTorrent. or Usenet, or on a website that also distributes pirated music or movies.
    Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website.
    Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    The software is advertised by means of spam or intrusive web ads.
    Software that is plainly illegal or does something illegal
    High-priced commercial software such as Photoshop is "cracked" or "free."
    An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    You win a prize in a contest you never entered.
    Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    Anything online that you would expect to pay for is "free."
    Unexpected events
    You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. New threats are emerging on a daily basis. Research has shown that most successful attacks are "zero-day" — that is, previously unknown. Recognition-based malware scanners do not defend against such attacks.
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize without the need for any software; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Software may be able to tell you which particular trojan it is, but do you really care? In practice, there's seldom a reason to use recognition software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every unknown email attachment until proven otherwise. Nevertheless, ClamXav or a similar App Store product may be useful if an uninformed network administrator says you must have some kind of "anti-virus" application.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. "Hmmmm, this torrent is a crack of that new game I want. I think I'll download it. It could be a trojan, but the antivirus will warn me if it is." Then they wonder why their Mac is so slow all of a sudden. It's slow because it's running flat out mining bitcoins for a hacker who has already sold their credit card number and banking passwords to a criminal gang. Maybe a week later the antivirus does warn them, but what good does that do?
    Nothing can lessen the need for safe computing practices.

  • My Macbook all of a sudden can't open Skype, Word, Excel, Powerpoint and Entourage. I have done research and read that it has something to do with malware and viruses. Please help I feel like I have tried everything!

    This started a few days ago, when I noticed skype would not open and keeps quitting unexpectingly. Now it's all of my microsoft office programs. I have read horrible things on the internet about creeps building some sort of 'backdoor' through Mircosoft Word and are now able to access my macbook. I want to feel safe again and I want to be able to use skype again. I think I will delete Microsoft office until I find/can afford a better version.
    I have tried deleting and re-installing the programs, PRAM-ing my mac, doing the utilities organizing thing, and I downloaded 4 different scanners (Cleanmymac, VirusBarrier Express, Bitdefender Virus Scanner, and ClamXav) to help get rid of this and only one scanner found a small file that was harmful. I need some advice PLEASE!
    Thank you for your time!

    Elliottarian wrote:
    Thanks MadMac0 I followed the instructions in Terminal for the link you sent and all my programs open again!
    Sorry I'm just getting to this now, but a lot going on today in this front. There is now a "K" version of Flashback and perhaps more going on.
    A couple of considerations you need to be aware of.
    It's clear from the results of your testing that the reason you were infected is because your Java is out of date, so it's important that you keep all your software up-to-date going forward.
    But even that won't protect you from this new "K" version as Apple has not released the patch to it yet, so I encourage you to disable Java in all your browsers and consider doing so for everything by opening Java Preferences (located in /Applications/Utilities/) and unchecking the box next to "J2SE 6.0" and any other box that might be checked. If you find that some application(s) you need must use Java, then you should enable it only to run that application(s).
    We cannot be certain that what you did totally killed the Trojan, so your best bet would be to restore your Mac back to where it was before you were infected using TimeMachine. If you don't have a TimeMachine backup or cannot determine the date of infection, then your safest solution is this one:
    Courtesy of Linc Davis:
    I suggest you take the following steps immediately:
    1. Back up all data to at least two different devices, if you haven't already done so.
    2. Boot from your recovery partition (if running Mac OS X 10.7 or later) or your installation disc (if running an earlier version of the Mac OS), launch Disk Utility, and erase the startup drive. This action will destroy all data on the drive, so you must be sure of your backups.
    3. Install the Mac OS.
    4. Reboot and go through the initial setup process to create an account. Don’t import anything from your backups at this stage.
    5. If running Mac OS X 10.6.x or earlier, run Software Update.
    6. Restore the contents of all the top-level subfolders of your home folder except “Library” from the most recent backup. You can also restore the files in the Library folder, but don’t restore any of its subfolders; only the files contained in those folders, and only if they’re visible in the Finder. Don’t restore any hidden files or folders, no matter where they are.
    7. If you’re running Mac OS X 10.5.x or earlier, disable Java in Safari’s preferences, and leave it disabled until you upgrade to Mac OS X 10.6.8 or later, including all available updates. The Java web plugin is unsafe to use under older versions of the Mac OS. Note: I’m not referring to JavaScript, which is unrelated to Java, despite the similarity in the names.
    8. Change every Internet password you have, starting with banking passwords. Check all financial accounts for unauthorized transactions. Take this step only after you’ve secured your system in the preceding steps, not before.
    9. Reinstall your third-party software from fresh downloads or original media, not from backups which may be contaminated. If you use any third-party web browsers under Mac OS X 10.5.x or earlier, disable Java in their preferences, as you did with Safari in step 7.
    Of course, as of this morning you should follow my instructions for disabling Java and ignore his, at least until Apple gets that Java patch out.
    Pay particular attention to Step 8 no matter what you decide to do.

  • I'm told there is a virus associated with Adobe Reader. How can I tell if my machine is effected and if so what is the cure. I'm running OS X10.6.8 on an iMac with safari 5.1.5

    I'm told there is a virus associated with Adobe Reader. How can I tell if my machine is effected and if so what is the cure. I'm running OS X10.6.8 on an iMac with safari 5.1.5

    There are no viruses currently affecting the Mac but there is something called Flashback which is malware that has been doing the rounds and affected many Mac users. Apple have released some updates to Java that should remove it and improve protection. Run Software Update to see if there is anything for downloading.
    A few precautions that can help prevent your Mac becoming infected:
    If you use Flash only download it directly from Adobe.
    In all web browsers disable Java (but do leave Javascript on as that's something else).
    In all web browsers make sure downloaded files aren't set to automatically open after downloading.
    Consider disabling Java completely (launch Java Preferences in the Utilities folder and disable it - you'll likely rarely, if ever need it. If you do just turn it on and off again when your done).
    You can also check out this link:
    http://lifehacker.com/5900434/how-to-find-out-if-your-mac-was-infected-by-the-fl ashback-trojan-in-one-click

  • Javascript in IE no longer working

    Hello-
    I have a Windows server 2012 R2 with what I believe has a problem with Javascript and Internet Explorer.  If I go to certain web sites, they appear blank & I’ll see in the lower right and corner of the Internet Explorer window “javascript;”. 
    Other symptoms include pressing F12 and getting a blank page for developer tools, going various websites and the buttons are either missing or don’t “click” when I press them.  Outside of Internet Explorer, if I go into gpedit or the services mmc, the
    Extended tab on these utilities do not display anything other than a partially filled window with solid color or it’s blank.  If I click on the Standard tab of these apps, all is good.
     I’ve searched for possible solutions & did the following:
    With the exception of the latest MS April patch, I’m up-to-date.
    Re-registered the following .dlls:  mmcndmgr.dll, vscript.dll, jscript.dll & jscript9.dll
    Turned off IE Enhanced Security  for both Administrators & Users
    Made sure Javascript was enabled in IE security settings
    Turned off Windows firewall- didn’t buy me anything so I turned it back on
    I’m not sure when this started happening.  For what it’s worth, I installed Firefox and had no problem with the website that gave me grief in IE.  Anti-virus has been removed; in fact my suspicions lie with the trial version of McAfee SaaS that
    was on this server.  I followed instructions to remove the produce properly, including using their un-install app in  “run as Administrator” mode.
    Many articles that I read state to uninstall IE & re-install it to resolve this issue; unfortunately 2012 R2 comes with IE11 already installed, so I’m at a loss.
    Looking forward to some excellent advice!
    Dan

    Robert -
    I have problems using the Microsoft Forums on this server as well.  For example, the “Quick access” dropdown on the left is there, my mouse
    pointer turns to a finger when I hover over it, but when I click on it nothing happens.
    The F12 function doesn't work on this site either.  Furthermore I can go to Google's site (which seems to work) but pressing the F12 key
    gives me the same broken results:  a blank frame on the bottom portion of the browser that only has the question mark, the greater than sign, the “frame to Window” button or x to close the frame in the upper right corner of the frame.
    For what it’s worth, I don’t have these problems on another Windows 2012 R2 Server at the same location.
    Any ideas or other items to clarify?  Thank you for your interest, Robert.
    - Dan

  • Javascript buttons and links no longer work in Firefox after latest update

    Whenever I try to use a javascript button or link, nothing happens, I just get a message in the bottom bar such as: "javascript:window.close();" telling me what the command is, but when I click on it, nothing happens. I cannot close windows in social security or in any other program using javascript. This has happened since the last upgrade to Firefox 11. I even tried completely uninstalling and reinstalling (using the Mozilla instructions to '''completely''' remove Firefox) a fresh Firefox eleven, to no avail. I made sure javascript was completely enabled in tools/options/content

    I have a similar problem like this. I dont know what the deal is but since some type of either add on upgrade or firefox upgrade i get notifications to install flash when i try to launch anything from google music. I did everything you can think of including uninstalling, reinstalling both the add on "No Script" Firefox itself, ran several diagnostic programs to ensure it wasnt any type of malware, reinstalled Adobe Flash 11, Verified Java version. I even tried to play music from google music in IE8 and that worked so its clearly Mozilla and its add ons. I disabled No Script and Google Music miraculously started working fine. This is pretty irritating considering I do everything in my power to ensure I dont get hit with any type of malware, virus, spyware, etc and No Script is definitely an Add on i like to use for that very reason since Firefox no longer supports the Norton Web Tracker add on. Any fix for this foolishness would be great, thanks!!

  • Do I need to have any type of anti-virus or malware, spyware protection for my Macbook Pro?

    My Macbook is a year old. When I bought it, I was told by several people that I would not need any type of anti-virus software or anything to protect my computer because Mac did not get infected that often. However, I have had people today tell me that I do need protection for my computer. My Mac runs about as good as the day I got it, but I really don't want anything to happen to it. If I need to get an anti-virus, or malware/spyware software, what programs would y'all recomend? I am just looking for information. Thanks!

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • I have a mac book air. Have had no issues with any virus before but today my safari page keeps directing me to a page which says " cyber crime" posing to be by Cheshire Police AUthority uk metropolitan police.Tells me that I have 24 hours

    I have a mac book air. Have had no issues with any virus before but today my safari page keeps directing me to a page which says " cyber crime" posing to be by Cheshire Police AUthority uk metropolitan police.Tells me that I have 24 hours to pay a 100 pounds.Using my ipad I looked it up and it appears to be a very common virus.I am worried about my Mac(relieved at the same time that I am not a cyber criminal
    !) so anyway what should I do.I tried to fonce quit and then open safari but only that page keeps opening up.Looking up online their was a suggestion to reset safari, but I am unable to click on the reset safari tab as the pop up for stay on page keeps coming up.i have switched off my lap top now.But am really worried.How can I get rid of it?

    It's not a virus. It's a JavaScript scam that only affects your web browser, and only temporarily.
    Some of those scam pages can be dismissed very easily. Press command-W to close the tab or window. A huge box will pop up. Press the return key and both the box and the page will close. If that doesn't happen, continue.
    From the Safari menu bar, select
              Safari ▹ Preferences... ▹ Security
    and uncheck the box marked Enable JavaScript. Leave the preferences dialog open.
    Close the malicious window or tab.
    Re-enable JavaScript and close the preferences dialog.
    If the Preferences menu item is grayed out, quit Safari. Force quit if necessary. Relaunch it by holding down the shift key and clicking its icon in the Dock. From the menu bar, select
              Safari ▹ Preferences... ▹ Privacy ▹ Remove All Website Data
    to get rid of any cookies or other data left by the server. Open your Downloads folder and delete anything you don't recognize.

  • How do I get rid of viruses on my MAcBook Pro

    How do I get rid of viruses on my MAcBook Pro

    A
    It may not be malware, a Web scam that only affects your browser, and only temporarily. There are several ways to recover.
    1. Some of those scam pages can be dismissed very easily. Press the key combination command-W to close the tab or window. A huge box will pop up. Press the return key and both the box and the page will close. If that doesn't happen, continue.
    2. Press and hold command-W. You may hear repeating alert sounds. While holding the keys, click the OK button in the popup. A different popup may appear, which you can cancel out of as usual.
    3. From the Safari menu bar, select
              Safari ▹ Preferences... ▹ Security
    and uncheck the box marked Enable JavaScript. Leave the preferences dialog open.
    Close the malicious window or tab.
    Re-enable JavaScript and close the preferences dialog.
    4. If the Preferences menu item is grayed out, quit Safari. Force quit if necessary. Relaunch it by holding down the shift key and clicking its icon in the Dock. None of the windows and tabs will reopen.
    After closing the malicious page, from the menu bar, select
              Safari ▹ Preferences... ▹ Privacy ▹ Remove All Website Data
    to get rid of any cookies or other data left by the server. Open your Downloads folder and delete anything you don't recognize.
    B
    If the above step doesn't solve the problem, you may have installed one or more of the common types of ad-injection malware. Follow the instructions on this Apple Support page to remove it. It's been reported that some variants of the "VSearch" malware block access to the page. If that happens, start in safe mode by holding down the shift key at the startup chime, then try again.
    Back up all data before making any changes.
    One of the steps in the article is to remove malicious Safari extensions. Do the equivalent in the Chrome and Firefox browsers, if you use either of those. If Safari crashes on launch, skip that step and come back to it after you've done everything else.
    If you don't find any of the files or extensions listed, or if removing them doesn't stop the ad injection, ask for further instructions.
    Make sure you don't repeat the mistake that led you to install the malware. It may have come from an Internet cesspit such as "Softonic" or "CNET Download." Never visit either of those sites again. You might also have downloaded it from an ad in a page on some other site. The ad would probably have included a large green button labeled "Download" or "Download Now" in white letters. The button is designed to confuse people who intend to download something else on the same page. If you ever download a file that isn't obviously what you expected, delete it immediately.
    Malware is also found on websites that traffic in pirated content such as video. If you, or anyone else who uses the computer, visit such sites and follow prompts to install software, you can expect more of the same, and worse, to follow. Never install any software that you downloaded from a bittorrent, or that was downloaded by someone else from an unknown source.
    In the Security & Privacy pane of System Preferences, select the General tab. The radio button marked Anywhere  should not be selected. If it is, click the lock icon to unlock the settings, then select one of the other buttons. After that, don't ignore a warning that you are about to run or install an application from an unknown developer.
    Still in System Preferences, open the App Store or Software Update pane and check the box marked
              Install system data files and security updates (OS X 10.10 or later)
    or
              Download updates automatically (OS X 10.9 or earlier)
    if it's not already checked.

  • DO I need Anti-Virus for my Macbook Pro w/Retina Display?

    I am currently awaiting a MacBook Pro w/Retina Display and I am having an ongoing discussion with some work colleagues, since the Flashback Trojan appeared to infiltrate Mac's back in early 2012... DO I need Anti-Virus.. My argument is no, but everybody elses is yes!
    I would love to see some indepth feedback to send my PC lovers running!
    Thanks in advance.
    Regards,
    Joe

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files. This feature is transparent to the user, but internally Apple calls it "XProtect." The recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "archive extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn users who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software are likely to be infected.
    Software of any kind downloaded from a BitTorrent or from a Usenet newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. No intermediary is acceptable.
    5. Java on the network (not to be confused with JavaScript, to which it's not related) is a weak point in the security of any operating system. If a Java web plugin is not installed, don't install one unless you really need it. If it is installed, you should disable it (not JavaScript) in your web browsers. Few websites have Java content nowadays, so you won’t be missing much. This setting is mandatory in OS X 10.5.8 or earlier, because Java in those obsolete versions has known security flaws that make it unsafe to use on the Internet. The flaws will never be fixed. Regardless of version, experience has shown that Java can never be fully trusted, even if no vulnerabilities are publicly known at the moment.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, even supposing that they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. Windows malware attachments in email are almost always easy to recognize without computer assistance.
    8. The greatest danger posed by anti-virus software, in my opinion, is its effect on human behavior. When people install such software, which does little or nothing to protect them from emerging threats, they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

Maybe you are looking for

  • Requisitioner Help in Purchase Order Create  / Change / Display

    Hi Friends, Requiremnet : i want F4 Help in the Requisitioner Field from the Employee Master Table Is there any Exit or Enhancement Spot for this. Regards: Sridhar.J

  • Restrict KFF LOV in i-Expenses

    Hi All, I have a requirement where i need to restrict the list of values for Segment4 on a certain criteria when the user enters account details for Expense Reports in I-Expenses. Request you to kindly advise what could be the best approach to achiev

  • Programming Assignment Help

    Hello guys, I am a little rusty on my Java programming skills and I need some assistance with an assignment. I have created the program below and I keep getting the following error: Exception in thread "main" java.lang.NullPointerException *     at M

  • Missing mail accounts in Mail

    I have just migrated to a new computer from my old one and when I go in to mail I have none of my inboxes showing. I have all my accounts shown in system preferences, internet accounts but they fail to show up in my mail app. This is rather frustrati

  • How can i take Backup for my WLC 5508

    Plz help me to take backup for WLC 5508 Sent from Cisco Technical Support Android App