Please Excuse My language in this tutorial. Also for anyone under the age of 11, I would recommend you ask your parents for permission to read this. If you hate them just fuk that ok. Do wat you want read it... anyway that was a waste of time.
--------------------------------------------------------------------------
Ok you come home from school or work and you discover a new public on MPGH has been released, with no screenies. Oh and wait theres an outside link. You decide that getting a fked up computer is better than waiting for a mod to check it, so you go download it. You have ran the exe and it says "your system has encountered a problem.Shutting down inn 5,4,3,2,1.etc" Your heart starts to beat because you remember that the computer/laptop belongs to your dad/mum. You get a belly ache. You switch on your computer, the message comes again! you computer restarts. Your dad gives you a good spanking with his belt and You start to cry, you then remember oh yeah there was once a boy called IHelper.
OK THE TUTORIAL NOW BEGINS
__________________________________________________ ______________
What is a Virus?
hmm I think that questions fkin been answered a million times, but for tutorial purposes i will explain it to you.
Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. This is why you must wait for a fkin MINION OR MOD!
-------------------------------------------
What Certain virus programs are there?
Name: Trojan Horse
Picture:
Description: A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.
Name: Worm
Picture:
Description: A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer.
Name: Keylogger
Picture:
Features: (keystroke logger).
-Makes screenshots within the specified time interval.
-Saves the applications’ running and closing.
-Watches clipboard contents.
-Records all print activity.
-Records disk changes.
-Records internet connections.
-Records all websites visited.
-Records startup/shutdown.
-All the information is stored in the encrypted log file.
-Convenient interface of the log and screenshot view.
-Generates the report in the text and html format.
------------------------------------------
What anti viruses are there?
AVAST
ITS ON TRIAL BUT I WILL GIVE IT 2 YOU FOR FREE
avast! Professional Edition - antispyware
Rating: 10/10
NORTON 360
ITS ON TRIAL BUT I WILL GIVE IT TO YOU FOR FREE
Spyware Protection - Norton 360
Rating: 7/10
KASPERSKY
TS ON TRIAL BUT I WILL GIVE IT TO YOU FOR FREE
Kaspersky Lab: Antivirus software
Rating: 8/10
SYMANTEC
ITS ON TRIAL BUT I WILL GIVE IT TO YOU FOR FREE
Symantec - AntiVirus
Rating: 3/10 [very poor]
----------------------------------------------------------------------------------
freeware!
HOUSECALL
HouseCall - Free Virus Scan
SpyBot
The home of Spybot-S&D!
Malwarebytes
Malwarebytes.org
One Care [Internet explorer only]
Windows Live OneCare safety scanner: Free online tool for PC health and safety
What signs or things will you see if you have a virus?
Google search hijackers
IE sends you to pages you didn't ask for...
Pop up system notifications regarding virus/spyware; recommending you install some fake AV program that is designed to further infect you
Shut-down Window could keep popping up
A blue screen could keep coming on your screen
Loss of memory
I recommend you all get avast pro
SERIAL KEYS:
AVAST 4.8: W9482091R8800E1106-02UETZYJ
NORTON 360 all in one V3.0: TDC97-R4MHQ-TY83R-6HQ4J-TGRKG
KASPERSKY: DZ3A3-7XGVU-DH1YX-NXJYP
Symantec: cOMING sOON¬!
Click Thanks/REP
-IHelper