
Rogue security software were created and designed to be legitimate looking pop-up windows that advertise security update software. These windows might appear on a web page while users surf the Web. The “updates” or “alerts” in the pop-up windows call for users to take some sort of an action, such as clicking to install the software, accept recommended updates, or remove unwanted viruses or spyware. When users click, the rogue security software downloads to your computer. They may change the desktop background to a dramatic warning,redirect web browsers to a page that informs the user that they are infected and need to purchase a program, it can change the homepage to a security warning, or bombard the user with continuous security alerts from the task bar, often using the yellow triangle with an exclamation point used by Windows to denote a system error. These are all intended to prevent the user from removing the program and instead try to force them to buy the "full" version.
Here are some TIPS on how to make your computer VIRUS-FREE:
- Browse with Caution
- Use a high quality anti-virus program and make sure it is up to date
- Be wary of email attachments. Treat any email attachment as potentially dangerous
1. To know exactly check the location of the virus, data gathering is very important. You may use these suggested tools like Autoruns and Hijackthis
2. Analyze the information collected. You can make use of search engines like Google to check if a file is valid or malicious.
Not an expert? Just save the log report and let a friend with more troubleshooting experience take a look. A large community of users participates in online forums, where experts help interpret results to clean up infected computers.
3. It is easier to work in Safe Mode to avoid too many alerts coming from the Rogue Security Software.
How to boot your computer to Safe Mode with Networking:
a. Shut down your computer
b. Turn it on again
c. The moment you have hit the power button, press F8 continuously
d. Select safe mode with Networking ( make use of the up and down arrow to select that option)
e. Press Enter
f. Choose your Windows Operating System and Press on Enter
4. Remove the permission of the file.
How to Remove Permissions:
a. Right click the file
b. Click Properties
c. Click on Security Tab
d. Click Advanced
e. Remove the check on "Inherit from parent the permission entries that apply to child object......."
f. Click remove on the window that will pop-up
g. Click Okay then click Yes
h. Click Okay
5. Delete all infected files using Unlocker or the Hijackthis tool. You can also useTwinfix as an alternative for the Unlocker.
To effectively use the tools mentioned above, these few guidelines might help:
Unlocker and Twinfix are effective tools for deleting a specific file or folder saved on your computer
Example: C:\WINDOWS\system32\sbwltbxa.exe
Hijackthis is an effective tool to delete registry keys and other services.
How to Use the Unlocker tool:
a. Download and install Unlocker tool here.
b. Extract then install it afterwards.
c. Right click the each infected files and click Unlocker.
d. Click on the drop-down menu and replace "No action" with "Delete".
e. Click on Okay.

