November 7, 2009

Signs of Intenet browser hijacker infection

Internet Browser Hijacker Symptoms

1. Browser hijacker changes homepage of web browser and prevents user from modifying it.

2. It redirects web browser to unwanted websites.

3. It redirects web searches to unwanted websites.

4. It blocks certain websites.

5. It loads commercial/deceptive pop-ups.

6. It blocks security tools.

7. It changes Favorites/Bookmarks.

8. It modifies the HOSTS file.

Browser hijacker is one of the most widespread infections. The purpose of hijacker is to force people into visiting unwanted websites. Although such a malware doesn’t bring a destructive payload, it may lead people into downloading malwares or it may download malwares without user’s permission. Browser hijacker may also lead into losing money or personal information. Browser hijacker makes it difficult or impossible to browse the internet. It may also make it difficult to use a computer.

1. Browser hijacker changes homepage of web browser and prevents user from modifying it.

Changed homepage of a web browser is the most obvious and the most common symptom of residing browser hijacker. It modifies the homepage and it keeps changing it to the same predefined address if user attempts to change it into some regular website.

2. It redirects web browser to unwanted websites.

Web browser may keep redirecting people to certain websites. Browser hijackers usually open fraudulent websites or websites related to online sales. Some of these websites might be malicious and they might be able to infect computers.
Learn more: How to recognize a rogue website?

3. It redirects web searches to unwanted websites.

Browser hijacker may redirect victims to fake online search results. It may also mimic online search engine in order to trick people into visiting malicious websites.

4. It blocks certain websites.

Browser hijacker may prevent victims from visiting certain websites (i.e. websites related to cyber-security). It may also block all the websites and load a blank page or fake error page instead of certain website.

5. It loads commercial/deceptive pop-ups.

Browser hijacker may load annoying pop-ups trying to attract visitors to certain websites. Sometimes it may keep generating the pop-ups in large amounts so people can close neither the advertisements nor the browser.

6. It blocks security tools.

Some of the browser hijackers are able to block security programs in order to prevent user from deleting the malware. This kind of hijackers usually promotes fake security tools or fraudulent applications.
Learn more: How to recognize a rogue security program?

7. It changes Favorites/Bookmarks.

Browser hijacker may add new entries on the Bookmarks or Favorites lists. This is usually done by hijackers that promote adult websites, drugs selling websites, fake online search engines and similar internet sources.

8. It modifies the HOSTS file.

Some browser hijackers may modify the HOSTS file to make sure victim ends up visiting predefined website instead of certain address (i.e. it may redirect user to certain porn website every time the victim types
Learn more: How to block malicious websites using HOSTS file?

Related Articles to remove sysdate.exe
2.How to remove I Love You Virus
3.How to Remove csrcs.exe or csrsc.exe Virus
4.How to remove regsvr.exe
5.Drives are not opening by double click. What to do ?
6.Signs of Intenet browser hijacker infection
7.Spyware threats and removal instructions
8.How to remove Autorun.inf
9. How to enable task manager

Spyware threats and removal instructions

These all are not Antiviruses.All are spywares-Beware of following spyware software.

We are here to help you remove spyware, adware and other malicious software from your computer. We are proud to present decent information on the latest security threats and cyber safety related issues. contains a database of the latest computer security threats: adware, backdoors, browser helper objects, browser hijackers, keyloggers, remote administration tools, rogue antispyware, malicious domains, tracking cookies, trojans and worms. We provide simple and comprehensive instructions on how to remove these threats manually or what software to use.



BlockProtector joins the gang of the “Block *” rogue programs such as Block Keeper, Block Watcher and Block Scanner. All these applications are malicious and fraudulent.
Block Protector displays lots of counterfeit infection warnings such as the following:

Spyware Alert!
Your computer is infected with spyware. It could damage your critical files or expose your private data on the Internet. Click here to register your copy of BlockProtector and remove spyware threats from your PC.

BlockProtector is also able to fabricate Windows Security Center messages. All the notifications loaded by Block Protector are falsified. Do not trust the malware and don’t buy this fraudulent tool.

MaCatte Antivirus 2009

MaCatte Antivirus 2009 is a hoax trying to mimic design of McAfee program in order to trick people into buying the app. Don’t mistake McAfee for MaCatte Antivirus or the other way around. McAfee is pretty reputable security tool while MaCatte Anti virus 2009 is pure fraud.


MaCatteAntivirus2009 generates large numbers of infection alerts and demands $99.99 for deleting the imaginary threats. The pop-ups are not only annoying; they also interrupt regular programs and web browsing. MaCatteAntivirus 2009 may hijack web browser.

MaCatte Antivirus2009 infects computers upon visiting malicious web sources, those usually are adult websites. It also spreads with help of trojans.


Block Keeper is yet another fake security application joining the crew of BlockWatcher, BlockScanner and a bunch of other identical frauds.


Block Keeper reaches its victims with help of trojans disguised as video codecs or Flash updates. BlockKeeper is also distributed via fraudulent websites such as

BlockKeeper malware is easy to spot because it displays loads of counterfeit security alerts. The warnings are meant to scare people into purchasing the program. Don’t fall for the falsified infection alerts and don’t waste your money for a malware.


BlockWatcher is another poorly designed rogue program distributed by trojans and fraudulent websites. Once installed, it requires paying for keeping the tool as if users had a choice. Block Watcher is difficult to remove without any reputable security tools.


BlockWatcher comes from the same cloning machine as BlockScanner, SoftBarrier, ShieldSafeness and approximately 30 other similar fake applications. It loads numerous annoying pop-ups warning people of malware. Block Watcher itself is a computer infection so you shouldn’t trust notifications it loads. It’s not only annoying but it is also dangerous. BlockWatcher may disable legitimate spyware removers and make a computer vulnerable to future infections this way.


BlockScanner looks like a poorly made security tool but its real purpose is intimidating people into purchasing useless program. The only way Block Scanner differs from its previous versions is the name on the logo. If you take a look at SoftBarrier or ShieldSafeness, you will see that they are all identical applications.


BlockScanner delivers annoying security alerts. They are meant to scare people into thinking the system is badly compromised. If clicked upon, the pop-ups urge to pay for using the tool. The demand is ironical because Block Scanner is installed without users’ permission. Don’t trust notifications loaded by this fraudulent program!

Windows Enterprise Suite

Windows Enterprise Suite is a computer infection and a fake application combined in a single piece of software. The program may look like a legitimate tool since it mimics behavior of real security tools. It’s named as it was part of Windows operating system; the fact may confuse some people into actually buying WindowsEnterpriseSuite.


Windows EnterpriseSuite is made by the same scammers who presented Volcano Security Suite earlier this week. The malware displays large numbers of counterfeit security alerts. It creates many problems including slow performance and hijacked web browser. WindowsEnterprise Suite offers fixing the computer after users pay for a full version of the program. That is the core of the scam: getting money for a nonfunctional tool.


SoftBarrier is another copy of recent ShieldSafeness, SoftStronghold and SoftVeteran frauds. The aforementioned programs are not only fraudulent, but they are also malicious.


Soft Barrier reaches its victims via infected websites and trojans. It displays annoying pop-ups and interrupts normal use of computer. SoftBarrier may hijack web browser or interrupt surfing the internet. It may also block legitimate security programs.

The main sign of Soft Barrier infection is fake security alerts. The rogue tool loads plenty of made-up warnings and system scan reports. The fabricated notifications are meant to push users into buying the rogue program. Avoid SoftBarrier and remove it as soon as it shows up.

Desktop Defender 2010

Desktop Defender 2010 is a rogue program pretending to be a security tool. It’s easy to mistake the malware for a real anti-spyware since it’s installed secretly by trojans. It looks like it is part of Windows operating system because it appears out of nowhere and it claims to be a spyware remover.


DesktopDefender2010 is no better than its earlier variants: Unvirex and Contraviro. It brings a bunch of harmless files onboard and then it reports the same files as dangerous infections. It constantly displays annoying pop-ups urging people to buy DesktopDefender 2010 for deleting the fake threats. Desktop Defender2010 may cause more trouble to push people into paying for this fraudulent program.

Volcano Security Suite

Volcano Security Suite is a rogue application spreading all over the web with help of Vundo and other trojans. It is distributed on malicious websites as well.

Volcano SecuritySuite is not a real security kit. It, however, tricks people into purchasing it by imitating actions of anti-spyware and anti-virus programs. VolcanoSecuritySuite mimics computer scan and reports numerous infections. It constantly loads fabricated threat alerts. The fake warnings encourage buying full version of VolcanoSecurity Suite for deleting the imaginary infections. The program is a hoax and it’s not capable of detecting or deleting a thing. What Volcano Security Suite really does is slowing the compromised machine down, hijacking web browser and generating annoying pop-ups.


ShieldSafeness is a regular fake security tool: it offers computer protection for a certain fee while Shield Safeness itself is a computer infection.


ShieldSafeness joins the long line of identical rogue antispyware programs. SoftStronghold, TrustSoldier and SafeFighter are some of the recent cousins of Shield Safeness. The program is installed secretly along with numerous harmless files. ShieldSafeness later “detects” the useless files as computer infections and it offers paid version of the tool for deleting the fake threats.

Shield Safeness may disable legitimate security applications and it may hijack web browser.

Total Security

Total Security is a successor of Total VirusProtection tool (learn how to remove Total Virus Protection). Since TotalSecurity is a clone of rogue program, you shouldn’t expect it to function properly.

The newer version of this malware named Total Security 2009 is even more pesky. Click here to delete TotalSecurity 2009.


Total Security is typical fraudulent software. It displays large numbers of counterfeit security alerts and it urges people to pay for using the tool. TotalSecurity costs either $49.95 or $79.95 but it’s not worth a dime. The program is nonfunctional unless you’re looking for some tool to halt a pc and to generate annoying pop-ups.

Related Articles to remove sysdate.exe

2.How to remove I Love You Virus

3.How to Remove csrcs.exe or csrsc.exe Virus

4.How to remove regsvr.exe

5.Drives are not opening by double click. What to do ?

6.Signs of Intenet browser hijacker infection

7.Spyware threats and removal instructions

8.How to remove Autorun.inf

9. How to enable task manager

Clamwin portable antivirus

If you use a pen drive, it is a good idea to equip and protect it with a portable antivirus software. The best choice is Clamwin portable antivirus.ClamWin Free Antivirus does not include an on-access real-time scanner, and you need to manually scan a file in order to detect a virus or spyware.To install ClamWin Portable, just download the portable package and select the location (the Pendrive)to which you wish it to install.After installing you can download the virus definitions and updates.
ClamWin Portable supports running from a CD. To set it up, extract ClamWin Portable to a local drive and run it. Download the latest virus definitions. Then close ClamWin Portable. Move the ClamWin.conf file from the ClamWinPortable\Data\settings directory to the ClamWinPortable\App\clamwin directory. Then burn the whole ClamWinPortable directory to CD. Be sure not to move any of the files from the default locations.

Why I recommend this utility
  • High detection rates for viruses and spyware
  • Regular virus database updates. ClamAV team regularly updates virus databases to include a new virus/variant immediately after it appears
  • It is a Standalone Virus Scanner
  • It can be configured to run from a CD also


WinPatrol -Tuneup Utility For Faster PC Startup

slow computer,computer faster,pc tune upImagine your PC has got a watchdog that is ever-vigilant, keeping an eye on the programs running on your PC and making plenty of noise when something seems out of place. WinPatrol does exactly this and more.slow computer,computer repairIt can easily make a slow computer to run faster with lower startup times and can be a good pc tuneup utility.

WinPatrol will
  • keep tabs on programs running on your PC including the hidden ones.
  • alert you if a program tries to install something unexpected.
  • block the offending programs from automatic startup or just monitor them to see what they do.
  • through delayed Start force non-essential programs to launch up to an hour after the system boots.
  • alert you about Spyware, Adware & nasty programs that may infiltrate your computer without your knowledge.
  • stop programs that repeatedly add themselves to your Startup List.
  • Delete and Remove the most Stubborn Infections.
What else can you ask for.

Installing WinPatrol is quick and easy. When you run WinPatrol you may not notice any changes at all. The only visible change you'll see is Scotty on guard down in your system tray. Whenever a new program is added to the Startup Programs list, Scslow computer,computer repairotty will warn you of the change. You will then see the name of the new program and can decide if this program is ok, or if it is suspicious.
Right clicking on a particular program will enable you to do many things like.
This button will not delete any programs from your hard drive. Instead it will remove only the entry for that program in the Startup Programs list, preventing the program from restarting every time your system does.
When you disable a program in WinPatrol it will automatically be removed. It will also be removed whenever it is detected in the future.
This button allows you to add a new program to the list of programs that will always start when you reboot or logon to your computer.
Delete File on Reboot
If after trying to remove a suspicious or dangerous program you find it still will not go away, right-click on the title of the program and select "Delete File on Reboot." This action will not take place until the next time you boot, but the file will be deleted before Windows starts and any other programs that may attempt to prevent its deletion. 
Dealing with Stubborn Programs
If you notice a Startup Programs entry keeps coming back after you disable or remove it, you should take a peek at the Active Tasks currently running. Sometimes malicious programs will come in pairs or groups that protect each other to prevent you from removing them.

Convert PDF documents to word documents

If you require editing a PDF document, you can do it by purchasing an expensive PDF editor. Another and better option is to convert the document into a word document and edit it and then you can re convert the edited word document to PDF.PDF to word document converter is a cute free software which will help you to convert texts, images and shapes in your PDF documents without losing the layout. It can convert all the pages, or any pages range of the PDF file.
And it is a standalone program - you can convert PDF to Word Doc without Adobe Acrobat Reader or Microsoft Word installed! It supports Adobe PDF 1.0 - 1.6 formats and can automatically open the output file when the conversion is done.

Free PDF to Word Doc Converter cannot convert PDF file with password protection. You may need PDF Password Recovery software to remove the password of PDF file before converting it to Word file. If you want to convert the word document to PDF document you can use Cute PDF.


Inkscape -the powerful vector graphics editor

Inkscape -the powerful vector graphics editor

ink scape,bitmap to vector,icon design,svgInkscape is an Open Source vector graphics editor, with capabilities similar to Illustrator, CorelDraw, or Xara X, using the Scalable Vector Graphics (SVG) file format.
Graphic editors generally belong to two categories- Vector editors and bitmap editors and their capabilities complement each other.
Vector editors are better for graphic design, page layout, typography, logos, sharp-edged artistic illustrations, technical illustrations, diagramming and flowcharting. Bitmap editors are more suitable for retouching, photo processing, photorealistic illustrations, collage, and hand drawn illustrations using a pen tablet.
GIMP and Photoshop are great bitmap editors while CorelDRAW, Adobe Illustraink scape,graphics software,bitmap to vector,icon design,svgtor, Xara Xtreme, Adobe Fireworks, Inkscape or SK1 are the main vector editors.
Inkscape is amazingly powerful and can be used to create realistic images like the car image shown here. The interface is really cute and you need not wander around in search of any tool or option.
Creating objects
Pencil tool, the pen tool, calligraphy tool, paint Bucket tool, rectangle tool, ellipse tool, polygon tool and text tool help to create common objects and specialized tools like Spiral tool and 3D Box tool also will be handy in certain situations.
Object manipulation
Every object in the drawing can be subjected to transformations like moving, rotating, scaling and skewing. Inkscape has a comprehensive tool set to deal with paths, as they are the most common constituents of a vector image. The Node tool allows to edit the path on the single node level by tweaking the position of nodes and control points of Bezier paths.
Inkscape's text editing is powerful with a text rendering based on the Pango library, which allows Inkscape to support several complex scripts including Hebrew, Arabic, Thai, Tibetan, etc.
Unlike many other GTK+ applications, Inkscape uses its own renderer library to create graphics, called 'libnr' which can render images at up to 25600% zoom with anti-aliasing. Another advantage is the facility to save documents in PDF format.
svg,vector graphics

Magnetic Screen Saver

Screen savers and wall papers make your system lovable to all who use it. Magnetic provides excellent collection of great wall papers and amazing screen savers to beautify your system.Magnetic is spy-ware or ad-ware free and you can trust it.To download Magnetic click the link below.

Windows XP-System Restore

Before You Try System RestoreSystem Restore should only be used after trying less comprehensive methods of troubleshooting. System Restore changes many files and registry entries, and in some cases might replace more files than you want restored. 

Run problem applications in Compatibility Mode 
If system instability occurs after installing a particular application. To run the Program Compatibility Wizard:
Click Start, point to All Programs, point to Accessories, and then click Program Compatibility Wizard.

Use Add or Remove Programs to uninstall a problem application 

If the system instability has occurred immediately after a new application has been installed and running the program in Compatibility Mode hasn't helped. Although System Restore will remove the application if you choose to apply it, it is better to remove the offending application from Control Panel. 

 How to open Add or Remove Programs:
1. Click Start, click Control Panel, and then click Add or Remove Programs.
2. Click the program you want to remove, and then click Change/Remove.

If the system's instability has occurred immediately after a new device driver is installed, use the Device Driver Rollback feature instead of System Restore.

How to roll back to an earlier driver:
1. Right-click My Computer, and then click Properties.
2. On the Hardware tab, click Device Manager.
3. In the Device Manager dialog box, double-click the hardware that uses the driver in question.
4. In the device Properties dialog box, on the Driver tab, click Roll Back Driver.
Windows XP troubleshooters in the Help and Support Center. To open a troubleshooter:

1. Click Start, and then click Help and Support.
2. Under Pick a Help topic, click Fixing a Problem.
3. Under Troubleshooting problems in the right pane, click List of troubleshooters, and then start a troubleshooter by clicking the name in the left column of the table.

If, after trying these options the computer is still unstable, opt for System Restore. You'll want to save this option for last because the changes made to your computer are more comprehensive than if you simply uninstall a program or rollback a device driver.

To use the System Restore Wizard, make sure you're logged on as an administrator, and then follow these steps:
1. Click Start, point to All Programs, point to Accessories, point to System Tools, and then click System Restore.
2. On the Welcome screen, click Restore my computer to an earlier time, and then click Next.
3. On the Select a Restore Point page, select the date from the calendar that shows the point you'd like to restore to, as shown in Figure 2, and then click Next.

Figure 2
4. On the Confirm Restore Point Selection page, verify that the correct restore point is chosen, and then close any open programs.
5. Click Next if you are ready to proceed or click Back to change the restore point.
6. The computer will shut down automatically and reboot. On reboot, you'll see the Restoration Complete page, and then click OK.   

After reviewing the stability of your system, you can choose another restore point or undo this restoration. Just open System Restore and make the appropriate choice. After you use System Restore, you'll have an additional task, Undo my last restoration, on the System Restore Welcome page. Remember that you'll have to reinstall any programs that were installed after the restore point. 

If System Restore doesn't work in Normal Mode, it might work in Safe Mode. To use System Restore in Safe Mode, press the F8 key during reboot and choose Safe Mode.

How to Create Restore Points Manually

Only application installations that use a System Restore restorept.api-compliant installer will trigger the creation of a restore point. So it's a good idea to create a restore point manually before you install an application that you suspect won't have one a restorept.api-compliant installer. For example, before installing a screensaver you've downloaded from the Internet or a beta program from a software vendor, you should manually create a restore point. For more information, see the TechNet article, Windows XP System Restore.

To manually create a restore point:
1. Click Start, point to All Programs, point to Accessories, point to System Tools, and then click System Restore.
2. On the Welcome page, click Create a restore point.
3. On the Create a Restore Point page, enter a descriptive name for your restore point, as shown in Figure 3, and then click Create.

Figure 3 

The Restore Point Created page confirms that the new restore point has been created. I think it's a good idea to manually create a restore point before you download and install any application from the Internet.
Use Scheduled Tasks 

You can use Scheduled Tasks to create restore points at specified times. You might want to configure Scheduled Tasks to run System Restore at 6:00 P.M. daily, so that you always have a restore point available at the end of each working day.

To create a Scheduled Task, log on as an administrator, and then follow these steps:
1. Click Start, click Control Panel, click Performance and Maintenance, click Scheduled Tasks, and then double-click Add Scheduled Task.
2. Click Next on the first Scheduled Task Wizard page.
3. On the second page, click System Restore in the list of applications, and then click Next.
4. Continue through the wizard, specifying the days and times to run System Restore.
5. When prompted, type in the user name and password for an administrator of the system, and then click Finish. Scheduled Tasks starts each time you start Windows XP and runs in the background.

Troubleshoot System Restore
Some common problems that could cause System Restore not to work properly and their solutions include the following:
There is less than 200 MB of free space available on the computer—free up some space on the hard drive by deleting unused files or images.
After rebooting, the restoration is unsuccessful—choose an earlier restore point and try again.
Restoration was denied due to non-administrator status—log out and then back in as an administrator.
The System Restore Service is not running—Open Administrative Tools, click Computer Management, and then click Services and Applications. Click Services, and double-click System Restore Services from the list. Verify the service is started and running. If not, under Service status, click Start and change the startup type to Automatic. 

System Restore is no substitute for regularly backing up your data. System Restore comes into play when your computer becomes unstable. System Restore can't be used if your hard drive fails or is melted down in a fire, because the information that System Restore uses is stored on the hard drive itself. To create regular backups of your data and computer system state, use the Backup utility in Windows XP.

To open Backup:
Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Backup. 

When you use Backup, save the backup information to a disk or an external drive for safekeeping. If there's a catastrophic failure, such as a hard drive crash, this backup can be used to restore the data after the hardware repair is complete.

DOWNLOAD -System Restore on Windows Vista and XP Guide in PDF format