TipsMake
Newest

System - Page 479

System is a fairly wide category, including popular Windows operating systems, how to ghost computers, install Win, fix computer errors, remove viruses, malware, security solutions, servers, network tips

The virus extends money to phone users
26 May 2019

The virus extends money to phone users

Security company Sophos has released a warning message to owners of Nokia Series 60 mobile phones and Symbian-based mobile devices on a computerized trojan named Viver. Mobile

Dangerous software on YouTube
26 May 2019

Dangerous software on YouTube

The malicious program, also known as Zlob, is capable of opening back-end ports on users' computers, hiding in files posted on Google's online video sharing system.

Deep 'Harry Potter died' spread strongly
26 May 2019

Deep 'Harry Potter died' spread strongly

Security experts have warned of a completely new type of computer worm, attracting users with a file called 'super cool' as a leaked version of 'Harry Potter and Death Valley'.

Trojans spread on Skype
26 May 2019

Trojans spread on Skype

According to the Websense security monitoring company on March 22, Skype is currently under attack by two malicious code names Warezov and Stration. Warezov and Stration are

Russian Trojan targets bank account
26 May 2019

Russian Trojan targets bank account

SecureWorks warned a Russian criminal organization is using the Gozi trojan to steal personal information by exploiting an Internet Explorer vulnerability.

Why is a virus scanning program not enough?
26 May 2019

Why is a virus scanning program not enough?

On the market today, no independent virus scanner is rated as the fastest or most effective in identifying viruses, trojans and other dangerous threats. This article will specify

Deep computer turned into Microsoft
26 May 2019

Deep computer turned into Microsoft

Security firm Sophos has warned users of e-mail about a new computer virus that spreads quickly with a sophisticated distribution. It is disguised as an email to the user inbox

The fake IE 7 virus appears
26 May 2019

The fake IE 7 virus appears

If you receive an email asking you to download Internet Explorer 7 Beta 2, delete it immediately. Because it was just a virus that appeared and spread by forging the latest

First iPod virus: harmless!
26 May 2019

First iPod virus: harmless!

Last week, security firm Kaspersky Labs said it had discovered the first virus, designed to attack iPods alone. However, a few hours later, Kaspersky quickly realized that the

Distributing spam with the theme of US-Iran war
26 May 2019

Distributing spam with the theme of US-Iran war

Taking advantage of the tension in relations between the United States and Iran, from the weekends, hackers have triggered the spam wave bringing topics of war between the two

Malicious code is growing up
26 May 2019

Malicious code is growing up

Security firm McAfee warns that malicious code is currently on the way to prepare to reach a new level of complexity and professionalism. Not only the malicious code and adware

Red alert: Virus attacks mass!
26 May 2019

Red alert: Virus attacks mass!

A huge wave of the Storm Worm worm variant is flooding Internet users' mailboxes around the world in the helpless, unaware of many security applications. Of the 31 antivirus

Discover new worms attacking Skype
26 May 2019

Discover new worms attacking Skype

Security software vendors have discovered a type of computer worm that attacks Skype's VoIP application to collect email addresses and send users to a variety of sites containing

'Treat' Yahoo Messenger virus
26 May 2019

'Treat' Yahoo Messenger virus

In the meantime, many viruses via Yahoo Messenger messages have caused many people to be upset and frustrated. This article explores viruses through Y's messages! and a few tips

Malware reconciliation design (Part 4)
26 May 2019

Malware reconciliation design (Part 4)

In the previous sections of this article, I have shown you how to receive and open a packaged UPX file. In the next section, we will actually look at a malware sample in the