Sunday, 29 September 2013

How to Close Running Applications Apps on updated Iphone IOS7?

In iOS 6 and previous versions you had to double-tap the Home button to show the tray containing all the apps which were running in the background, using up all the smartphone or tablet’s precious resources (particularly RAM). You’d then tap and hold any one of them to make them all wiggle, and press the red cross to close the app.

It was never a good system, and most people didn’t realise you didn’t actually have to tap the ‘x’ – pressing anywhere on the icon would close the app.
In iOS 7, reviewed, you still double-tap the Home button to bring up the list of running apps, but it’s now a full-screen affair, no matter whether you’re using an iPhone, iPod touch or iPad.

How to close Apps in IOS7?

They’ve Changed The Way You Close Apps

Too many programs running at once? Every seasoned iPhone user knows what to do: double tap the Home button, and X out the jiggling app icons. Even for a new user, it’s simple and intuitive. 


With iOS7, however, you’ll notice this function doesn’t work the same way anymore. Double tapping your Home button still brings up the app icons at the bottom of the screen, but now there are sample screens of what each app is running at the moment. And no amount of furiously button tapping will get them to jiggle.

Friday, 9 August 2013

What are the top 10 computer viruses?

Rank Virus Name Total Qty Detected*
10 mhtredir 224,699
9 mydoom 703,753
8 dumaru 756,743
7 klez 936,758
6 lovgate 1,147,340
5 bagle 4,267,388
4 mime 6,469,549
3 sober 10,057,537
2 objectdata 11,548,333
1 netsky 70,360,394

What is ELK CLONER Virus?

Remember Apple II computers? They were common in school classrooms in the 1980s...which is fitting, because this early virus, perhaps the first to target personal computers, was designed for Apple IIs and written by a high-school kid.

Richard Skrenta was a ninth-grader in 1982 when he wrote the virus, which caused infected computers to display a poem every 50th time they booted up.

That's it, just a poem (ah, we were so innocent back then). Because Elk Cloner was a boot sector virus, it infected any floppy disk that was placed in the computer …which in turn infected other computers.
By now, that kind of stuff is a given, but in 1982, it was groundbreaking.

What is conficker Virus?

What made Conficker so huge, when it hit in late 2008, was the mystery surrounding it. Ooooh, Conficker.

It had a scary-sounding name and, even scarier, it wasn't really doing anything…yet.
Conficker was assembling an army of computers, called a botnet, but no one was sure where the battle would be.

The virus was telling the infected computers, now potentially zombies, to contact specific sites on certain days...was it to obtain further instructions? Their orders? Who knows?
Most companies and governments installed security patches to protect their computer systems, but some infected machines remain out there, still part of the army.
In theory, they're still ready to serve if Conficker calls.

What is Brain Computer Virus?

Brain may not have been the most sophisticated virus, but in 1986 it was the first to really target PCs, via Microsoft's then-dominant DOS operating system.

The virus ate up a huge chunk of memory and caused computers to display a message warning that they had been infected.

It even told them whom they should call to get disinfected: a couple of brothers in Pakistan. Those brothers, the original developers, claim they weren't trying to cause so much trouble; they created the virus as a means of copy protection for their medical software...but then someone else came along and copied that bit of code and the brothers got more than they had bargained for, with pleas for disinfection coming from around the world.
The moral of the story? Be careful what you program.

What is ILOVEYOU Virus?

The ILOVEYOU virus went for the heart, hoping you'd take a chance and open an attachment labeled as a love letter.

Really? People fell for this? Yes.

As many as 10 percent of all Internet-connected computers were infected at the virus's peak in 2000.
The virus spread through the email attachments, but it also replicated itself on a computer's hard drive, directing the computer to download a password-stealing application from the Internet.
Worldwide damage estimates were in the billions of dollars. All for love, right? Yeah, not so

What is Morris Computer Virus?

The Morris worm started as an experiment, insists Robert Tappan Morris, who in 1988 was a Cornell graduate student.

He distributed the worm in an attempt to gauge how big the then-infant Internet was, but things kind of got out of control from there. The worm spread to some 6,000 university and government computers, slowing them down (and occasionally causing them to crash) as it copied itself (often numerous times on one machine) and spread.

Morris was convicted and fined, but served no time for his little research project. Today, he's a professor at MIT. Let's hope his students have learned from their professor's mistakes.

Code Red I and II Computer Viruses

The Code Red viruses were very, very sneaky worms.

They didn't require you to do anything to become infected (you didn't need to open an attachment or download a file); all it took was an active Internet connection for the virus to take advantage of a flaw in the Windows operating system. And what did the viruses do?

Well, for one, they turned your computer into a slave, letting someone offsite operate it remotely. That means they could steal what was on your computer or even use your computer to do some bad things…like, say, overloading the White House computers by telling all the infected computers to contact its address.

Luckily, the government was able to shift to another address to escape the attack, but other servers weren't so lucky. In the end, over 200,000 servers were hit by the Code Red virus in 2001.

What is Melissa Virus?

Melissa was a new virus for a new age: the email age. Forget floppies, this one was among the first to spread via the dreaded email attachment.

It also pioneered the art of breaking into your address book and sending itself to all your contacts. The virus would arrive via an innocent-looking email that told you to open a document… and why would you open a document from a stranger? You wouldn't.

Remember the whole address book thing? So, when you got an email from, say, your boss, telling you "Here is that document you asked for," there's a pretty good chance you might open it. Whoops.
Hacker David Smith claimed he wrote the virus for a stripper named Melissa who he had met in Florida. Right, because everyone knows girls are suckers for a destructive bit of code.

What is Nimda Virus?

Nimda (that's "admin" spelled backward) hit the virus scene in 2001 and quickly (very quickly) rose to the top.
In just 22 minutes, Nimda went from a nothing to being the most widespread computer virus on Earth. How?
It spread via email, via Web sites, via server vulnerabilities. It pretty much had all the bases covered. It even used some old backdoors opened up by past viruses to get into servers and muck up Internet traffic.
As for the fear factor, Nimda had great timing, hitting just a week or so after the Sept. 11 attacks and prompting fear that it was the first in a new wave of Al Qaeda cyberterror attacks.
Those fears turned out to be unfounded and, while a few networks may have crashed, our Internet infrastructure is still standing today.

What is sasser virus?

The Sasser worm was a destructive beast when it hit in 2004, counting big targets such as the British Coast Guard (which lost its mapping capabilities), Agence France-Presse (which lost its satellite communications) and Delta Airlines (which had to cancel flights when their computer system went down).
Universities, hospitals and large corporations all reported infections that caused computers to repeatedly crash. So, who was responsible for this large-scale act of cyberterror? A rogue cell? An unfriendly government? How about a 17-year-old German kid? Bingo.
Thanks to his young age, Sven Jaschan served no jail time. He was, however, sentenced to 21 months probation and some community service. Ah, youth.

What is Storm Virus?


Remember when viruses were just for living things?
By now, computer viruses have become a regular annoyance of modern life and having a sick computer can slow you down far worse than your average cold.
Here are a few computer viruses of note, from the innocent to the malicious.

No. 01 - Storm Virus

Storm gets its name from the trap that is its method of infection.
Starting in early 2007, users began receiving emails with the subject line, "230 dead as storm batters Europe," and a link to the story.
Don't click! No! You've instead been led to an infected site, and you're now downloading the virus, like it or not.
The Storm headlines changed to suit the news, but the virus stayed just as dangerous, infecting as many as a million computers and recruiting them into its botnet.
What's more, Storm has gotten sneakier over time, sending out emails that appear to be from tech support saying to click on a link for a security upgrade (quite the contrary) or sending links to online porn or celebrity photos or even an ecard.
To this day, it remains a major security risk and continues to spread in new ways, including via links inserted into blog postings and bulletin boards. Watch out.

How to remove Google Redirect Virus (Removal Instructions)

If every time you do a search and click a result link,you end up on some random page, even though the link shows you’d be going elsewhere,then we’ve got a bad news for you,your computer is infected with malware.

A Google redirect is often caused by a rootkit  which will hijack your search results and redirect you to a web site from which the malware writers collect affiliate revenue.

This infection is designed specifically to make money. It generates web traffic, collects sales leads for other dubious sites, and tries to fool the victim into paying for useless software. If those tricks don’t work it can kick up the threat level by downloading additional malicious or misleading programs.
In the below guide,you’ll find instructions how to remove the Google redirect virus and other malware that you have on your machine.

Google Redirect Virus – Removal Instructions

STEP 1:  Remove Google redirect virus with Kaspersky TDSSKiller

The most likely cause for your Google redirection is rootkit or a Master Boot Record infection.In this first step, we will run a system scan with Kaspersky TDSSKiller to remove this infection.
  1. Please download the latest official version of Kaspersky TDSSKiller.
    KASPERSKY TDSSKILLER DOWNLOAD LINK(This link will automatically download Kaspersky TDSSKiller on your computer.)
  2. Before you can run Kaspersky TDSSKiller, you first need to rename it so that
    you can get it to run. To do this, right-click on the TDSSKiller.exe icon and select Rename.
    Edit the name of the file from TDSSKiller.exe to iexplore.exe, and then double-click on it to launch.
  3. Kaspersky TDSSKiller will now start and display the welcome screen and we will need to click on Change Parameters.
    Kaspersky TDSSKiller change settings
  4. In the new open window,we will need to enable Detect TDLFS file system, then click on OK.
    Kaspersky TDSSKiller Detect TDLFS file system
  5. Next,we will need to start a scan so you’ll need to press the Start Scan button.
    Kaspersky TDSSKiller start scan
  6. Kaspersky TDSSKiller will now scan your computer for any bootkits infection.
    Kaspersky TDSSKiller scan
  7. When the scan has finished it will display a result screen stating whether or not the infection was found on your computer. If it was found it will display a screen similar to the one below.
    Kaspersky TDSSKiller results
  8. To remove the infection simply click on the Continue button and TDSSKiller will attempt to clean the infection.A reboot will be require to completely remove any infection from your system.

STEP 2: Remove the malicious files from your computer with  Malwarebytes Chameleon

Malwarebytes Chameleon is a powerful utility from Malwarebytes, that will stop any m malicious process from running and remove its malicious files from your computer.
  1. Download Malwarebytes Chameleon from the below link and extract it to a folder in a convenient location.
    MALWAREBYTES CHAMELEON DOWNLOAD LINK  (This link will open a new web page from where you can download Malwarebytes Chameleon)
  2. Make certain that your infected computer is connected to the internet and then open the Malwarebytes Chameleon folder and double-click on svchost.exe.
    Malwarebytes Chameleon
    IF Malwarebytes Chameleon will not open, double-click on the other renamed files until you find one will work, which will be indicated by a black DOS/command prompt window.
  3. Follow the onscreen instructions to press a key to continue and Chameleon will proceed to download and install Malwarebytes Anti-Malware for you.
    Malwarebytes Chameleon press key
  4. Once it has done this, it will update Malwarebytes Anti-Malware, and you’ll need to click OK when it says that the database was updated successfully.
    Malwarebytes Chameleon updating its database
  5. Malwarebytes Anti-Malware will now attempt to kill all the malicious process associated with Google redirect virus.Please be aware that this process can take up to 10 minutes, so please be patient.
    Malwarebytes Chameleon killing malware
  6. Next, Malwarebytes Anti-Malware will automatically open and perform a Quick scan for Google redirect virus malicious files as shown below.
    Malwarebytes Chameleon quick scan
  7. Upon completion of the scan, click on Show Result
    Malwarebytes Chameleon scan results
  8. You will now be presented with a screen showing you the malware infections that Malwarebytes Anti-Malware has detected.

  9. Make sure that everything is Checked (ticked),then click on the Remove Selected button.
    Malwarebytes Chameleon malicious process
  10. After your computer restarts, open Malwarebytes Anti-Malware and perform a Full System scan to verify that there are no remaining threats

STEP 3 : Remove the malicious registry keys added by the Google redirect virus

In most cases any Google redirect virus will add some malicious registry keys to your Windows installation,to remove them we will need to perform a scan with RogueKiller.
  1. Please download the latest official version of RogueKiller.
    ROGUEKILLER DOWNLOAD LINK (This link will automatically download RogueKiller on your computer)
  2. Double click on RogueKiller.exe to start this utility and then wait for the Prescan to complete.This should take only a few seconds and then you can click the Start button to perform a system scan.
    RogueKiller scanning after ZeroAccess virus virus
  3. After the scan has completed, press the Delete button to remove any malicious registry keys.
    Remove ZeroAccess virus  infection with RogueKiller

STEP 4: Remove Google redirect rootkit with HitmanPro

  1. Download the latest official version of HitmanPro from the below link.
    HITMANPRO DOWNLOAD LINK(This link will open a download page in a new window from where you can download HitmanPro)
  2. Double click on the previously downloaded fileto start the HitmanPro installation.
    [Image: HitmanPro Icon]
    IF you are experiencing problems while trying to starting HitmanPro, you can use the “Force Breach” mode.To start this program in Force Breach mode, hold down the left CTRL-key when you start HitmanPro and all non-essential processes are terminated, including the malware process. (How to start HitmanPro in Force Breach mode – Video)
  3. Click on Next to install HitmanPro on your system.
    [Image: Starting HitmanPro]
  4. The setup screen is displayed, from which you can decide whether you wish to install HitmanPro on your machine or just perform a one-time scan, select a option then click on Next to start a system scan.
    [Image: HitmanPro installation screen]
  5. HitmanPro will start scanning your system for malicious files as seen in the image below.
    [Image: HitmanPron scanning for Google redirect virus]
  6. Once the scan is complete,you’ll see a screen which will display all the malicious files that the program has found.Click on Next to remove this malicious files.
    [Image: HitmanPro scan results]
  7. Click Activate free license to start the free 30 days trial and remove the malicious files.
    [Image: Activate HitmanPro license]
  8. HitmanPro will now start removing the infected objects.If this program will ask you to restart your computer,please allow this request.

STEP 5: Remove the residual damage from your browser

  1. You can download AdwCleaner from the below link.
    ADWCLEANER DOWNLAOD LINK (This link will automatically download AdwCleaner on your computer)
  2. Before starting this utility,close all open programs and internet browsers.
  3. Double click on adwcleaner.exe to run the tool.
  4. Click on Delete,then confirm each time with Ok.
    Adwcleaner utility
  5. Your computer will be rebooted automatically. A text file will open after the restart.
  6. NEXT,double click on adwcleaner.exe to run the tool.
  7. Click on Uninstall,then confirm with yes to remove this utility from your computer.

STEP 6: Double check for any left over infections on your computer

STEP A: Run a scan with Eset Online Scanner.
  1. Download ESET Online Scanner utility.
    ESET Online Scanner Download Link (This link will automatically download ESET Online Scanner on your computer.)
  2. Double click on the Eset installer program (esetsmartinstaller_enu.exe).
  3. Check Yes, I accept the Terms of Use
  4. Click the Start button.
  5. Check Scan archives
  6. Push the Start button.
  7. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  8. When the scan completes, push Finish
STEP B: Run a scan with Emsisoft Emergency Kit.
  1. Please download the latest official version of Emsisoft Emergency Kit.
    EMSISOFT EMERGENCY KIT DOWNLOAD LINK (This link will open a download page in a new window from where you can download Emsisoft Emergency Kit)
  2. After the download process will finish , you’ll need to unpack EmsisoftEmergencyKit.zip and then double click on EmergencyKitScanner.bat
  3. A pop-up will prompt you to update Emsisoft Emergency Kit , please click the “Yes” button.After the Update process has completed , put the mouse cursor over the “Menu” tab on the left and click-on “Scan PC“.
  4. Select “Smart scan” and click-on the below “SCAN” button.When the scan will be completed , you will be presented with a screen showing you the malware infections that Emsisoft Emergency Kit has detected.Make sure that everything is Checked (ticked) and click on the ‘Quarantine selected objects‘ button.

Next,we will remove the tools that we’ve used in our malware removal process.
Kaspersky TDSSKiller,AdwCleaner and RogueKiller can be removed by deleting the utilities.
We strongly recommend that you keep Malwarebytes Anti-Malware and HitmanPro installed on your machine and run regular scans with this tools.If you however,wish to remove them,you can go into the Add or Remove programs and uninstall this two on-demand scanners.

If you are still experiencing problems while trying to remove Google redirect virus from your machine, please start a new thread in our Malware Removal Assistance forum.

How to get rid of Google Redirect Virus?

Consultant Bob Eisenhardt recounts his frustrating experience trying to track down and get rid of a client's search-redirect virus. Here's how he finally ditched it.

Ever go to Reno, Nevada?  Well, if you have not, there is a terrific little virus making its way around the net that instantly takes you there from your search engine. About a month ago, one of my accounts in Manhattan reported that something was re-directing searches to odd websites, one of them coming up as SEARCH RENO. I tested the search on-site and it was indeed true.
All of the standard defense protocols such as a scan with MalwareBytes and ComboFix came up clean. Although the bug is commonly referred to as TDSS, the software fix that a co-consultant I work with totally trusted, TDSSKiller, came up equally clean. This was a surprise.
Sophos has a rootkit killer that also found no infections. ComboFix came up empty handed as did Gmer. Having thus exhausted the standard solutions, I was mightily frustrated.

Further research led me to a persistent link that indicated a services search for RANDOM.EXE running. It was not running on my client's system. The random.exe link also advertises a paid software product to remove the virus, with a live chat concurrent with somebody (probably in India). I ignored that option instantly. (I have come to believe that some blogs pose question and answers by the same user under different names, an ingenious idea for the uninitiated to download an infected product.)
So where does this one come from? The redirect URL takes users to the IP address 63.209.69.107. If you google that IP, you are off on a hunt of severe frustration. This virus has been around awhile, but finding a solution remains confusing. Let's look at that IP address for moment. It is related to SCOUR.COM as a redirect agent. This is either a real or a fake site and the virus itself uses complex methods to hide from traditional removal methods as I undertook above. There seem to be two threats here - a search hijacker and Trojans hiding in the links on the redirect page. The former just slows down your system and makes life frustrating, which is common enough with Windows itself. The Trojan is an open door for someone far away to control your computer and steal information. In a worst-case scenario, malware of this type can steal your financial information and then wipe out your drive. This is precisely what happened to 30,000 systems in Saudi Arabia recently. Trojans must be removed quickly and that is the devilish part to do.

I am heavily qualifying my certainties because this is such an odd entry into the virus and malware world; for instance, I do not know exactly where the infection comes from. We can be reasonably certain that some (not all) porn sites will infect your system as well as other compromised sites that include links to sketchy destinations.

If memory serves, there was also a quick re-direct agent running when a Google search was initiated and before "Reno" arrived. It was hard to catch, maybe on bar for 2 seconds or so. I believe it was "myfreesearch" or similar. The category of MYFREE something has always been an annoyance, such as MY FREE WEBSEARCH, which is horrible. But this one came and went very quickly. I strongly urge security experts to use good eyesight to catch these momentary leads.

There is a variant of the redirect virus that attacks just Firefox. Mozilla Support lists a php script running on a different server (where, I know not) that kicks you over to "realgamerz.net" and similar shady sites. As above, traditional methods of elimination failed and Mozilla really has no clear cut answer. Nor does the voyage always take you to Reno -- one user reported being directed to bargainmatch.com when trying to find the Weather Channel.

All of which leads me to suspect that many variants abound of this virus, but I am almost beginning to think we are entering something beyond traditional virus and malware problems. This one, at least the one I hit, is very slick. We may be seeing a whole new breed of invasive tools come into play. A co-consultant was absolutely shocked that TDSSKiller did not find anything. Running HiJackthis produced a log that can be copied into an effective website, HIJACKTHIS.DE which will run an in-depth analysis and highlight potential issues. Even though several irregularities were spotted, again and again my client's system visited Reno.

Resolution was draconian but very simple - I gave up trying to remove the virus and used Revo uninstaller to remove Firefox entirely, trusting that I am confronted with a variant that infects just Firefox. After saving bookmarks, using Revo, a cold reboot, and then a reinstall, my client has confirmed that the problem has gone away. I am relieved of one more burden. (If I run into this virus again, I will try GOOREDFIX as some have suggested).

Hackers and thieves are, by now, well aware of the tools most professionals use to remove their products, and it would not be surprising at all to see them working their evil deeds around these tools. I generally believe that in the world of security I can stay ahead of the thieves by minus five minutes or so -- that there is always somebody out there already ahead of the game by just that much.

Why does my internet browser redirects to another random web-page when I click on a link.?

"Google Redirect Virus".

This virus is extremely common and is very bad news for your PC - because it basically changes a few of your most important settings and causes them to redirect your links & search engine results to random websites. Although 100's of people's computers get infected with this infection, it's actually very difficult to remove.

Unlike typical viruses, which will likely install a false application / files to make your computer run worse, the Google Redirect Virus will basically just change a few settings on your PC and then hide away. This not only makes your computer infected with a rogue virus, but makes most anti-virus tools powerless to remove it.

The virus works by basically hijacking the redirected links in your browser. Although it's called the "Google Redirect Virus", it actually redirects Facebook, YouTube & Myspace to advertising sites as well. It's often referred to as a "hijack" virus, which basically means that it will hijack the redirect process on your computer - which is used each time you click a link on Google / Facebook / Myspace / Youtube. Instead of redirecting to the actual website that you want to visit, the virus will take you to a false one, which is why you're seeing the various errors from these sites - because the advertising sites where the virus wants to take you are not working properly.

Fortunately, you can fix this virus by using a program called "ComboFix", which is able to repair the various files that it has infected. You can see a tutorial on how to use it here:
http://www.personalcomputerfixes.com/spy…

How to Remove Police Central e-crime Unit Virus? ( PCeU Scam )

The scam PCeU page blocks your screen?It is not possible for you to get past the desktop on start up? It appears again after you reboot your PC ?

Your computer is infected by Police Central e-crime Unit virus ( PCeU scam ). This article is aimed at helping innocent victim remove this malicious virus and learn about knowledge about computer security. Please read more to follow the step-by step removal guide to get rid of Police Central e-crime Unit virus ( PCeU scam ) completely.

What is Police Central e-crimal Unit Virus


Police Central e-crimal Unit virus, also called PCeU scam, is a malicious ransomware created by cyber criminals to rip off the victims by means of scaring, defrauding, and locking screen. Once infected by the virus, you will see a fake notification with the icon t ,or from Specialist Crime Directorate or Metropolitan Police claiming that your online activities have violated law like viewing or distributing prohibited pornographic content, illegally using or distributing copyrighted content, illegal access to computer data , etc locking your desktop. By disguising as legal authority, It blocks your desktop to stop your illegal action and then ask a fine of up to £100,000. Meanwhile, the ransomware threatens you that you have to pay the fine within 72 hours via Ukash or PaySafeCard, or you’’ll be sued. It is totally a scam designed by cyber criminals. And the fine is fake and non-existing. However, in order to make such fake notification looks more authentic and tricks more victims into paying the fine, it even displays your IP address and a fake video window to frighten you that your local legal department has monitored all your behavior online and recorded your illegitimate behavior online so as to scare some unsuspecting PC users into paying the fake fine. Remember that there is no authority monitors your online behavior. And cyber criminals use illegal means to get your IP address. Never pay a fine to those cyber criminals and ignore any of threats.
Police Central e-crime Unit virus has many variants and often updates its version of fake notification. Therefore, fake notifications victims see vary from regions. Some victims’ desktop are locked by fake alerts from Specialist Crime Directorate or Metropolitan Police, while some of them received fake notifications with PCeU icon. This virus mainly targets user in the united Kingdom and other countries.

When infected by Police Central e-crime Unit virus, you may see any of following screenshots.

Four screenshots of Police Central e-crime Unit virus with PCeU icon

2

3

PCEU-virus

Fake notification from Metopolitan Police

Metropolitan-Police-Police-Central-e-crime-Unit-Virus

Fake notification from Specialist Crime Directorate

Specialist-Crime-Directorate-Police-Central-e-crime-Unit-virus

Never trust what fake notification says, just remove this ransomware immediately.

How Does Police Central e-crime Unit Virus Infect Computer


Situation 1: Some malicious websites and legal websites that have been compromised as well as malicious links, attachments in spam emails may contain Police Central e-crime Unit Virus. When you click on them, Police Central e-crime Unit Virus may be downloaded surreptitiously.
Situation 2: You may be convinced that certain free software which may include malware is very useful for you. After your download and install it, malicious program Police Central e-crime Unit Virus may also be installed on your PC packaged with the free software.
Situation 3: Your PC may also be captured by Police Central e-crime Unit Virus via peer-to-peer file sharing websites which may carry some malware and virus.

Precautions


Avoid opening unknown, unwanted websites or links, attachments in spam emails.
Avoid downloading free software from unknown websites, especially peer-to-peer file sharing websites.
Install antimalware software to prevent your PC from the attack of ransomware and other malware.
Recommended: Anvi Smart Defender
Download link:http://www.dotfab.com/download_asd.html

Situation Possible to Occur When You Remove Police Central e-crime Unit Virus


The virus prevents you from entering into desktop and the computer system has been frozen. It has different variants that bring you a series of troubles.
Sometimes, you can restore your computer system in safe mode with command prompt;
Sometimes, you can’t find any restore points in the list causing they have been removed by the virus;
And sometimes, you cannot restart your PC causing the screen will be locked again after a several seconds.
Situations you may meet when you remove the virus depend on which variant the PC is infected. Also, some malicious files may be added to your computer and then bring you bad consequences.

Similar Ransomware 


The similar ransomware removal guides are offered below, if your PC is infected by one of the following virus, please click on it to see the specific removal steps.
Cheshire Police Authority Virus,   International Cyber Security Protection Alliance virus,   Politie Office Central Ukash Virus,   Spamhaus MoneyPak Virus,   Joint Chiefs of Staff MoneyPak Virus,   MoneyGram Virus,   FBI “Ihr Computer wurde gesperrt und alle Daten verschlüsselt wurden!” Virus,   Europol Interpol Paysafecard Virus,   FBI “Uw computer is vergrendeld en alle gegevens zijn versleuteld!” Virus,   CCIPS Moneypak Ransomware,   Decrypt Protect-MBL Block Off Virus,   United States Department of Justice MoneyPak Virus,   CashU Virus.

_________________________________________


How to Remove Police Central e-crime Unit Virus


(Tips for removing the virus)


Case 1: If you can get into the safe mode with command prompt, remove the ransomware by restoring your system.
Case 2: If you aren’t able to restart your PC or the restore points have been removed by the virus, get rid of the virus via Anvi Rescue Disk.

Method for case 1: Restore your PC in safe mode with command prompt.


Step 1> Restore computer in safe mode with command prompt


1. Restart your computer.

2. Repeatedly press F8 upon the opening of the boot menu to enter Windows in “Safe Mode with Command Prompt”.

1
3. Type “explorer” when the Command Prompt appears and press Enter.

2

Note: In some cases during infections of malware and viruses you only have 2-3 seconds to do this. In other cases if it doesn’t work during the given seconds, viruses such as the FBI MoneyPak ransomware virus will not allow you to type “explorer” anymore.

4. Once Windows Explorer shows up browse Win XP: C:\windows\system32\restore\rstrui.exe or Win Vista/Seven: C:\windows\system32\rstrui.exe, then press Enter.

3

5. When such a window appears, click next.

4

6. Choose a restore point from the list, then click next.

8

7. At last click finish to complete the restore.

9

8. Restart your PC to normal mode.

Step 2> Remove malicious files from your PC through Anvi Smart Defender


1. Install Anvi Smart Defender
Download and install the paid or free version of Anvi Smart Defender
Anti-malware software from the links below:
Download link:http://www.dotfab.com/download_asd.html
Purchase link: http://www.dotfab.com/asdupgrade.php

2. Click quick or full scan
After you install the program, please open it, and switch to Scan tab, perform quick or full scan to eliminate malware infections and any possible unwanted program.

7

3. Remove malicious files form your computer
Once the scan is over, Anvi Smart Defender
will display the scan results. Click on Remove button to completely remove the malicious files from your computer.

16

Step 3>Remove residual junk files, invalid registry entries form your computer via Cloud System Booster


There may exist some residual junk files and invalid registry entries, other related potentially unwanted programs in your computer system. Thus, Cloud System Booster is required to clean up them and to save your disk space so that as to increase running speed of your computer.

1. Download and install the paid or free version of Cloud System Booster system maintenance & optimizer software.
Download link: http://www.dotfab.com/download_csb.html
Purchase link: http://www.dotfab.com/csbupgrade.php

2. After you install the program, please open it, click on BOOST button on the main screen to run a quick and full scan.

csb-1

3. Once the scan completes, there will come out a result screen, please click Clean button there to remove these junk files, invaild registry entries, etc to make sure the computer system is clean.

Cloud System Booster-scan result

Option 2: If you can’t restart your PC, please use Anvi Rescue Disk to remove MoneyGram virus.


Below is a video of ransomware removal using Anvi Rescue Disk isofor your reference.

Step 1> Download the Anvi Rescue Disk iso image file


Download the Anvi Rescue Disk iso image file Rescue.iso and the USB disk production tool BootUsb.exe from Anvisoft official site. (Both are packaged in the file offered to download below.)
Direct download link: http://download.anvisoft.com/software/rescuedisk.zip
Please kindly note that Rescue.iso is a large file to download; please be patient while it downloads.

Step 2> Record the Anvi Rescue Disk isoimage to USB drive.


You can also record the iso image to a CD/DVD. We will introduce the steps to record iso image to a CD/DVD in following guide.

To record the Anvi Rescue Disk isoimage to USB drive:
1. Firstly find a clean computer with correct internet connection and then connect your USB driver to the clean computer. You’d better backup your important data and format your USB drive before using it to record the iso image.
2. Locate your download folder and double-click on BootUsb.exe to start it. And then click “Choose File” button to browser into your download folder and select Rescue.iso file as your source file.
USB burning

3. Select the path of USB drive, such as Drive H:
4. Click “Start Burning” to start the burn of USB Rescue Disk boot drive.
5.Please close BootUsb.exe tool after you successfully burn the file to the USB drive when you get the following message.
2

Now, you have bootable Anvi Rescue Disk to repair your computer.

——Alternative Option


You can also record Anvi Rescue Disk isoimage to a DV/DVD. Any CD/DVD record software is fine for burn iso image. If you don’t have any, you can download and install Nero Burning ROM and ImgBurn. Here we will use Nero Burning ROM for demonstration purpose.
Please open and start Nero Burning ROM and select Burn Image from the drop-down menu of the Recorder.
CD/DVD recorder

1. Locate your download folder and select Rescue.iso file as your source file and then click Open button.
9


2. Click Burn button to start record the iso image. After a few minutes, you will have a bootable Anvi Rescue Disk to repair your computer.

burn compiliation

Step 3> Configure your infected computer to boot from the USB drive/DV/DVD


Restart your infected computer and configure it to boot from USB drive/DV/DVD that recorded Anvi Rescue Disk.
Basically , you can use F8 to load USB boot menu.
For different motherboard, you may need to use the Delete or F2, F11 keys, to load the BIOS menu. Normally, the information on how to enter the BIOS menu is displayed on the screen at the start of the OS boot.
boot menu instruction

The keys F1, F8, F10, F12 might be used for some motherboards, as well as the following key combinations:
  • • Ctrl+Esc
  • • Ctrl+Ins
  • • Ctrl+Alt
  • • Ctrl+Alt+Esc
  • • Ctrl+Alt+Enter
  • • Ctrl+Alt+Del
  • • Ctrl+Alt+Ins
  • • Ctrl+Alt+S
If you can enter Boot Menu directly then simply select your CD/DVD-ROM as your 1st boot device.
If you can’t enter Boot Menu directly then simply use Delete key to enter BIOS menu. Select Boot from the main BIOS menu and then select Boot Device Priority. After that, set USB drive or CD/DVD-ROM as your 1st Boot Device. Save changes and exist BIOS menu.

Step> 4 Boot your computer from Anvi Rescue Disk.


After that let’s boot your computer from Anvi Rescue Disk.
1. Restart your computer. After restart, a message will appear on the screen: press any key to enter the menu. So, press Enter or any other key to load the Anvi Rescue Disk
2. please selected your preferred language and press Enter to continue.
Anvi Rescue disk language setting

Step> 5 Run the Anvi Rescue Disk to scan and repair.


1. Now you are in the mini Operating system, please double-click Rescue tool to start Anvi Rescue disk.
Anvi Rescue Disk
Important note: make sure that your computer is connected to network connection before you run a scan on your computer. If you fail to connect your computer to Internet, please check the tutorial on network configuration in this article: Network Troubleshooting Tips for Ransomware Removal Using Anvi Rescue Disk
Connection established

2. Please run a full scan by clicking the “Scan Computer” button in the middle of the program to detect and kill the PC lockup virus.

Anvi Rescue disk scan

3. Clicking “Fix Now” to Remove the detected threats detected by Anvi Rescue Disk.
Anvi Rescue disk fix now

4. Switch to Repair tab. Scan and fix the registry error with the “Repair” module of Anvi Rescue Disk.

Anvi Rescue disk repair

Important Notice: You must repair the registry error after kill the virus. Otherwise, you would be disabled to boot your Windows without fixing registry damaged by the virus.

Step>6 Download Anvi Smart Defender
antimalware to ensure a clean computer.


After the repair, your computer should be clean and rescued from the evil claw of the ransomware infection. However, many professionally crafted ransomware variants have evolved to be very persistent, that is to say, harder to remove, so you are highly recommended to download the antimalware Anvi Smart Defender
by clicking Yes button on the prompted window to fulfill the download.

Download ASD in Rescue Disk

After the download, please restart your computer to normal Windows mode and then go to the folder: C:\Users\[username]\Downloads
Find the downloaded file asdsetup.exe and double click its file to install it and then start it to perform a full scan on your computer system, in order to ensure the computer is clean from any associated infections or leftovers.
After the scan, remove any detected infections and then you can have a clean computer now.
Good luck and be safe online. If any question, feel free to contact us for timely help by sending us your email below.