Trojan horse virus..can't remove

Greetings,
recently I downloaded a video reader from a website.....but since I've done this it's taken over all the google, yahoo, and ask paid links and instead launched a website that directs me away from the paid links.
I've tried a few virus removers but they don't seem to remove the virus. Tried to clear all my cookies and cache..but it still comes back..need Help!
Any ideas??
best regards

You downloaded a file claiming it was a video codec from a **** site, which is why you now have a Trojan Horse. To remove it, download and run this program: DNSChanger Removal Tool, then reboot your Mac and the problem should be gone.
To avoid this problem in the future, don't visit **** sites, and definitely don't download things that are not from trusted sources, or at least legitimate sources. All legitimate video codecs come from real companies with real names and information about their codec.
Mulder

Similar Messages

  • I have  at trojan horse.norton can not remove or quarrantine.virus is 36c09694-167c0775.Help

    I have a trojan horse virus.36c09694-167c0775 Norton can not remove or quarrantine.Help

    I don't think anyone here will be able to identify which trojan that is, or whether, even, it's a Mac trojan. I would contact them. Only they will know what that code is supposed to mean.
    BTW, there is no such animal as a trojan horse virus. There are trojans and viruses, two entirely different things. Thre are no viruses at all for Mac.

  • Trojan Horse Virus

    A little while ago, my macbook was very slow and I went into the Apple store and they recommended that I turn Norton Antivirus off. I did.
    A few months later (now) I ran it just for the heck of it to see if it found anything - and it did. Two or three Trojan Horse malware files. Looking at Nortons descriptions, I think that they were (I located and deleted them) all PC based virus BUT, I am wondering:
    1. I have Microsoft Office for Mac on my Macbook and I am wondering if those files might have been compromised by a PC virus?
    2. I am assuming that if these files have been compromised there is nothing that I can do about retrieving that information as it could be anywhere.
    3. If I have other PC based drives hooked up to my macbook wirelessly - were they vulnerable while I had these Trojan Horses on my Macbook?
    Thanks.
    A.

    Don't always believe what Norton tells you. It is incompatible with OS X.
    Norton Antivirus has a very long and illustrious reputation for mangling Mac OS X systems, sometimes to the point where a complete reinstall is necessary. Among other things, it installs kernel extensions which are known to cause kernel panics and system freezes; it contains known and documented bugs which can silently corrupt Adobe Photoshop and Adobe InDesign files, destroy a user's ability to authenticate as an administrator, and (on PPC systems) can cause Classic to stop functioning; and Symantec has on at least two occasions now released flawed .dat file updates which erroneously report certain critical Mac OS X files as "viruses." (Deleting these "viruses" causes damage to the system that in some cases renders it unbootable.)
    1. No
    2. Need more details about what you call 'compromised'
    3. Yes.
    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download for Tiger and Leopard from (on no account install Norton Anti-Virus on a Mac running OS X):
    http://www.clamxav.com/
    The new version for Snow Leopard is available here:
    http://www.clamxav.com/index.php?page=v2beta
    (Note: ClamAV adds a new user group to your Mac. That makes it a little more difficult to remove than some apps. You’ll find an uninstaller link in ClamXav’s FAQ page online.)
    If you are already using ClamXav: please ensure that you have installed Apple Security Update 2010-005 and that your version of ClamXav is the latest available.
    However, the appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's (that's you!) DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works here:
    http://www.f-secure.com/v-descs/trojanosxdnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X. It's available here:
    http://macscan.securemac.com/
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper has recently been published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?mainpage=document_general_info&cPath=11&productsid=174
    Also, beware of MacSweeper:
    MacSweeper is malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer. It is the first known "rogue" application for the Mac OS X operating system. The software was discovered by F-Secure, a Finland based computer security software company on January 17, 2008
    http://en.wikipedia.org/wiki/MacSweeper
    On June 23, 2008 this news reached Mac users:
    http://www.theregister.co.uk/2008/06/23/mac_trojan/
    More on Trojans on the Mac here:
    http://www.technewsworld.com/story/63574.html?welcome=1214487119
    This was published on July 25, 2008:
    Attack code that exploits flaws in the net's addressing system are starting to circulate online, say security experts.
    The code could be a boon to phishing gangs who redirect web users to fake bank sites and steal login details.
    In light of the news net firms are being urged to apply a fix for the loop-hole before attacks by hi-tech criminals become widespread.
    Net security groups say there is anecdotal evidence that small scale attacks are already happening.
    Further details here: http://news.bbc.co.uk/2/hi/technology/7525206.stm
    A further development was the Koobface malware that can be picked up from Facebook (already a notorious site for malware, like many other 'social networking' sites like Twitter etc), as reported here on December 9, 2008:
    http://news.bbc.co.uk/newsbeat/hi/technology/newsid_7773000/7773340.stm
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    If you think you may have acquired a Trojan, and you know its name, you can also locate it via the Terminal:
    http://theappleblog.com/2009/04/24/mac-botnet-how-to-ensure-you-are-not-part-of- the-problem/
    As to the recent 'Conficker furore' affecting Intel-powered computers, MacWorld recently had this to say:
    http://www.macworld.co.uk/news/index.cfm?email&NewsID=25613
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program. A recent example is of malware distributed through innocent looking free screensavers: http://www.zdnet.com/blog/security/malware-watch-free-mac-os-x-screensavers-bund led-with-spyware/6560?tag=nl.e589
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through an AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5. Stop using LimeWire. LimeWire (and other peer-to-peer sharing applications and download torrents) are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking: http://news.bbc.co.uk/1/hi/technology/8420233.stm
    6. Resist the temptation to download pirated software. After the release of iWork '09 earlier this year, a Trojan was discovered circulating in pirated copies of Apple's productivity suite of applications (as well as pirated copies of Adobe's Photoshop CS4). Security professionals now believe that the botnet (from iServices) has become active. Although the potential damage range is projected to be minimal, an estimated 20,000 copies of the Trojan have been downloaded. SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg
    Also, there is the potential for having your entire email contact list stolen for use for spamming:
    http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1
    NOTE: Snow Leopard, OS 10.6.x, offers additional security to that of previous versions of OS X, but not to the extent that you should ignore the foregoing:
    http://www.apple.com/macosx/security/
    Apple's 10.6.4 operating system upgrade silently updated the malware protection built into Mac OS X to protect against a backdoor Trojan horse that can allow hackers to gain remote control over your treasured iMac or MacBook.
    http://www.sophos.com/blogs/gc/g/2010/06/18/apple-secretly-updates
    Finally, do not install Norton Anti-Virus on a Mac as it can seriously damage your operating system. Norton Anti-Virus is not compatible with Apple OS X.
    And if you are using iPhone Apps you are also at risk of losing all privacy:
    http://www.engadget.com/2010/10/03/hacker-claims-third-party-iphone-apps-can-tra nsmit-udid-pose-se/

  • My NB505-N500BL with windows 7 got a Trojan Horse Virus..

    Hello all,
    OK.. I bought this NB505-N500BL, Serial # a couple years ago, it has Windows 7 Operation system.   I loaned it out to a friend who promptly got a Trojan Horse Virus then sent it back to me.  I cannot find the original CD that came with this computer and I didn't make a recovery disc for it when I bought it.. (silly me)..
    Question:   How do I fix this problem? IS it worth fixing?  can I do it by buying a recovery disc from Toshiba OR do I need to buy new hardware?     
    Thanks..   Frank

    mini notebook NB505-N500BL
    Your support page is here - http://support.toshiba.com/support/modelHome?freeText=2871355
    From your user guide located here - http://support.toshiba.com/support/staticContentDetail?contentId=2865070&isFromTOCLink=false
    Before you start recovery plug in power supply for the entire process:
    You can recover the original factory image (returning the computer
    to its out-of-box state) using the utilities stored on your computer’s
    internal storage drive or using recovery DVDs/media, if you have
    created such media. To recover using the first method, follow the
    procedure below. To recover using the second method, see
    “Restoring from recovery DVDs/media” on page 60.
    To recover the original factory image using the utilities on your
    computer’s internal storage drive:
    1 Make sure the computer is turned off.
    2 Press and hold the 0 (zero) key on your keyboard while
    powering on the computer.
    Getting Started 51
    Recovering the Internal Storage Drive
    3 If your system offers a choice of Windows® 7 32-bit or 64-bit
    operating system, select one at this time. If not, skip to step 4.
    4 A warning screen appears, stating that when the recovery is
    executed all data will be deleted and rewritten. Click Yes to
    continue.
    (Sample Image) Warning screen
    5 When the Toshiba Recovery Wizard opens and the Selecting a
    process screen displays, select Recovery of Factory Default
    Software and then click Next.
    (Sample Image) Selecting a Process screen
    52 Getting Started
    Recovering the Internal Storage Drive
    6 The Recovery of Factory Default Software screen appears.
    Select Recover to out-of-box state.
    (Sample Image) Recovery of Factory Default Software screen
    7 Click Next.
    A confirmation message displays reminding you that all data
    will be lost during the recovery process. Be sure to save your
    work to external media before proceeding (see “Backing up
    your work” on page 93).
    8 Click Next to begin the recovery.
    When the process is complete, a message displays indicating
    that the internal storage drive has been recovered.
    9 Press any key on the keyboard to restart the computer.
    S70-ABT2N22 Windows 7 Pro & 8.1Pro, C55-A5180 Windows 8.1****Click on White “Kudos” STAR to say thanks!****

  • New Trojan Horse Virus

    First, I am aware that the Mac has never had a virus and is not readily suceptible to them due to the quantity of Macs in service and the complexity of the Unix format. However, I also realize that the word "never" is relative and no one knows what the future holds.
    In light of the "apparent" new Trojan Horse Virus that has just surfaced, could someone answer the following questions for information only.
    There is a question as to whether this is a Trojan Horse or a Virus. Has that been cleared up?
    I have followed the discussions concerning the various virus programs for the Mac. There seems to be problems with all of them such that many are saying the problems do not justify installing these, in light of the low probability of a virus or trojan horse. There is also the question that is raised as to why some of these programs work great for some and poorly for others. One of these programs seem to surface more than others. It is CLAMX AV.
    My questions concerning CLAMX AV is:
    Does this program simply identify a virus or can it be configured to quarantine, or delete the virus completely?
    If it will delete the virus, can this be done automatically in the background or is there some interaction that has to be done on the part of the user?
    What primary issues concerning my Mac must be considered before installing the program?
    Thanks
    Herschel

    There is a good guide to Leap-A at http://www.macworld.com/news/2006/02/16/leapafaq/index.php
    If you want to see how easy or hard it is to catch have a look at http://www.macworld.com/news/2006/02/17/leapafollow/index.php
    Prerequisites (even before you get to the point where you have to help it along its way by actually deliberately opening the offending file) involve using iChat over a Bonjour (not just internet) network under OSX10.4 while connected to someone infected with it.
    THis is clearly not really going to be a significant issue in itself, though others may try to emulate its operations with "nastier" enhancements.
    (Just by the way, Macs have had viruses etc in the past under earlier OS's. The last one I actually saw was on a machine running OS7.5 in the mid 1990's. It had arrived on the victim's machine on a floppy disc containing pirated software from an educational institution. Prior to the mid 1990's I saw three other incidences of virus infection on Macs - all on machines used in the education sector)
    Cheers
    Rod

  • Trojan Horse Virus in Flashplayer Update

    This is the second time within a month that the update has contained Trojan Horse virus.  How do I tell Adobe directly that they have a problem because I go round in circles trying to find a contact form.  Very annoying!!!!

    THERE IS NO VIRUS IN FLASH PLAYER
    Get it?
    Adobe IS NOT in the business of distributing malware.
    It was a "false positive" from a bad definition in your antivirus.
    Whether you like that reality or not... whether you agree with it or not... you can't change it!

  • Trojan Horse virus warning on my MAC

    I got a error message of Trojan Horse virus. the message has a number 800 404 5537 to help. They told me to enter an address on the internet explorer URL to control my computer to troubleshoot. Should I give them access? 

    This is a well-known fake tech support scam. If you call them, they will "show" you some things on your machine that they will tell you are indicative of viruses and other problems. (They are actually perfectly normal things that people can be easily frightened into misinterpreting.)
    If you go along with them, they will do two things: 1) require you to pay for a year or two of "service" by giving them a credit card, and 2) request remote access to your computer so they can fix it. They will then charge your credit card far more than they said they would and potentially use the remote access you grant them to install malicious software on your computer.
    Never fall for this kind of scam. If you do, there's only one possible response: cancel the credit card and erase the computer's hard drive.

  • TS1338 I have 4 Trojan Horse viruses on my external drive I use for Time Machine.  My MacBook Pro hard drive is clean.  I have eased the external drive 3 times using Disk Utility and it still has the 4 Trojan Horse viruses. How do I get rid of them. Wayne

    I have 4 Trojan Horse viruses on my external drive I use for Time Machine.  My MacBook Pro hard drive is clean.  I have eased the external drive 3 times using Disk Utility and it still has the 4 Trojan Horse viruses. How do I get rid of them. I am using 10.8.3  Wayne

    ksu62 wrote:
    The infection names are:  classload.jar-719ef6a5.zip
                                              classload.jar-5db452le31.zip
                                              ar3.jar-6ce3b2f-45l483f.zip
                                              classload.jar-lef99412-63bsd3fl.zip
    Those look alot like file names and not infection names. I don't find any reference to anything like that on Norton or VirusTotal. Since you said these were Trojans, I would expect to see "Trojan" as part of the infection name.
    ".jar" files are executable Java applets. The random alpha-numerics would seem to indicate a cache file, likely from a browser with Java enabled. And we all know what ".zip" means.
    Worst case is that you had Java enabled in a browser and were infected by one of the late variants of the Flashback Trojan over a year ago or one of a couple of other attacks using the same vulnerability but targetted against a small number of political sympathizers. Much more probable is that thes were Windows only Trojans. Hopefully you have a fully up-to-date OS X, including Java, and have disabled Java in all your browsers by now.

  • What about trojan horse virus?

    The news today discussed a new trojan horse stealing passwords, etc.  Is there any fix or software to prevent damage or loss of data?

    If you're running an iMac G5, that's a PPC Mac (you're in the wrong forum, BTW) I don't think you have much to worry about. As far as I know, and I could be wrong, the Flashback Trojan, at least right now, is not interested in PPC Macs. It appears to be written to attack Intel Macs only. In any case, since this could change, disable Java in the browser you use, to be safe.

  • I have a Trojan horse virus in my iPad 2 , my iPhone, and my desktop pc. My antivirus from my desktop got rid of it on my PC, how do I rid it from my IPad , and phone??

    I know I am not supposed to get a virus on apple products , but here I am. How do I rid myself of it. ??? How did  I get it in the fist place? Does apple make virus protection???if so where and how do I get it?

    So let me understand this.
    Not only are you the first person to have discovered a virus for Mac OS X, but this is also a miracle type of virus that can also be cross-compatible not just from a desktop, but also across both the iPad and even iPhone too?  Ammazing.
    Oh wait, better yet, this magical virus is even capable of working in both Microsoft windows environments, AND mac os X environments, AND iOS environments!
    What an ammazing feat instead! That author of the virus deserves the nobel prize of the century award I would think!
    However, I would first try to use a tiny bit of logic and reasoning before jumping to conclusions about magical viruses here. Just because something tells you a man has walked on water, doesn't mean it's really possible.

  • Boonana Trojan Horse

    Suddenly I'm being warned about the ""Boonana Trojan Horse" that can affect Macs because it's "cross-platform, java based and spread through social networks like Facebook." My quotes because I don't want to cry "wolf" or spread false information and rumor. My first thought is that if this is a problem it would be showing up here in support. Interestingly a search only revealed a page that doesn't exist any more. (Why?) Is Apple not forthcoming in identifying this problem to protect its image as a virus-proof platform? Or is it really not important? I wouldn't have considered the former had that page not come up missing.

    Boonana, aka Koobface, has made its appearance on the Mac, that much is true. However, much as I try not to rely on information from the security companies, since they are in the business of trying to sell you AV software, I do tend to listen more carefully when they are dismissive. See the Intego announcement:
    http://www.intego.com/news/trojan-horse-os-x-koobface-a-affects-mac-os-x.asp
    Note that Intego states that the current implementation of this malware is so flawed. It is not currently a threat due to bugginess, but if it should be updated, it could be dangerous.
    Also, note the warning dialog shown in the Intego advisory. It's scary-looking enough that nobody in their right mind would click the Allow button. (Unfortunately, it would seem that many people on Facebook or Twitter are not in their right minds...)
    More on this topic can be found in my [Mac Virus guide|http://www.reedcorner.net/thomas/guides/macvirus>, which I have updated to include this threat.
    null
    null

  • HT202456 Trojan horse

    My laptop boots up and I get the message I have a trojan horse virus. What do I do to remove it?

    This is a scam. If there is any telephone number given, please don't call these people.
    1. Force Quit .
        Press command + option + esc keys together at the same time. Wait.
        When Force Quit window appears, select  Safari if not already.
        Press Force Quit button at the bottom of the window.   Wait.
        Safari will quit.
    2. Relaunch Safari holding the shift key down.
    3. Turn off wifi and turn it back on.
        Turn off Wifi. Click Wifi icon in the menu bar and select “Turn Wifi off”.
        Visit another website.
        You won’t have internet connection.
        Turn on Wifi. Click Wifi icon in the menu bar and select “Turn Wifi on”.
        Select your Network.
    4. Safari > Preferences > Security > Privacy
        Cookies and website data:
        Click “Details” button.
        Remove the cookie related to this, if there is one.
    For more info:
    http://www.adwaremedic.com/kb/scampopups.php

  • Resent trojan horse

    just wondering if there any resent trojan horse to be careful about or mac specific viruses

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. A discrete Java installer is distributed by Apple, and another one by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it, if at all, only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be as safe from malware as you can practically be, short of not using the Internet at all.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • I have received an email from a friend with a link which I clicked. It directed me to the google home page and I am now suspicious that it is a virus  or a Trojan horse. I would know what to do on my PC but am new to Ipad. How can I check?

    I have received an email from a friend with a link which I clicked. It took me to the google home page. I am now suspicious that my friend's email account has been hijacked and the link contained a virus or a Trojan horse. I would know what to do on my PC but am new to the IPad. Can any form of Trojan horse be planted on IOS 6 or am I worrying unnecessarily? Reassurance would be most welcome as I do use the IPad for checking bank details and web purchases. Thanks for any help.

    PC virus won't run on iPad.

  • Can't find file for Trojan Horse on my MacBook

    Anyone seen this before?
    I have the Norton Antivirus Program installed on my MacBook.
    I believe an attack occurred while I was looking through the Apple Support Forums for help with a QuickTime problem and accidentally clicked on the following link: http:www.smacktalkpaintball.com/video/
    The Norton Warning came up and I hit the delete option and then set Norton to scan manually.
    The following came up at the end of the scan:
    Virus "bof.jar-51a4bd07-3d4b399d.zip" detected, Today at 7:24 AM. Repair failed.
    /Users/Owner/Li...bd07-3d4b399d.zip Trojan Horse infected
    I was not able to locate either of these files anywhere on my computer.
    I have two external hard drives that I use to back-up data, but neither of them were connected at the time of the attack, and nothing else was connected when I ran the virus scan.
    I do not have Windows installed on this MacBook - Mac OS X, Version 10.5.8,

    Norton was able to detect the Trojan whereas MacScan was not, but Norton was not able to remove it
    That sounds an unlikely outcome on both counts. Norton anti-virus is just that: anti-virus, and I would not trust it to deal with trojans.
    Are you sure you actually installed a Trojan?
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's (that's you!) DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works here:
    http://www.f-secure.com/v-descs/trojanosxdnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X. It's available here:
    http://macscan.securemac.com/
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)

Maybe you are looking for

  • Change default page size

    When printing a front panel the default page size is letter. My windows printer has A4 as default page size. LabView always overrides my printer's default page size to letter. The problem: I want to print programmatically the front panel. With the pa

  • Fillable Forms and Excel

    Hey there, I'm new to these forums, so maybe this problem has already been addressed. I've got about 800 PDF forms that we're trying to create about various property information.  That information exists in GIS software in a .dbf format, and I conver

  • GR before PGI date

    Hi SAP Guru's, My problem is in STO scenario,Assume PGI at 28/02/2007 in sending plant but in recieving plant they are allready recieve the material at 20/02/2007 (GR before PGI date) Is there any message type to restrict this type of problems. Pls a

  • Partial Driver Implementation

    Hi All, My application needs to connect to a sql database, which provides a partial driver implementation. Means to say that It does not implement either DataSource or XADataSource. But for my enterprise application, deployed on Sun One Application S

  • Unble to access the JNDI server in J2EE 1.4 RI ...

    Hi, the following code can be used to access the JNDI "server" included in the J2EE 1.3 RI, from a client placed at anywhere (you also must include the j2ee.jar in the classpath at runtime) : Hashtable env = new Hashtable(); env.put(Context.INITIAL_C