Saturday, January 30, 2010

Rogue Security Software


Rogue security software were created and designed to be legitimate looking pop-up windows that advertise security update software. These windows might appear on a web page while users surf the Web. The “updates” or “alerts” in the pop-up windows call for users to take some sort of an action, such as clicking to install the software, accept recommended updates, or remove unwanted viruses or spyware. When users click, the rogue security software downloads to your computer. They may change the desktop background to a dramatic warning,redirect web browsers to a page that informs the user that they are infected and need to purchase a program, it can change the homepage to a security warning, or bombard the user with continuous security alerts from the task bar, often using the yellow triangle with an exclamation point used by Windows to denote a system error. These are all intended to prevent the user from removing the program and instead try to force them to buy the "full" version.

Here are some TIPS on how to make your computer VIRUS-FREE:
  • Browse with Caution
  • Be wary of email attachments. Treat any email attachment as potentially dangerous
In such cases that this rogue security software infected your computer that somehow changed your Desktop background and slowed down the computer, here are some helpful ways on how remove it:

1. To know exactly check the location of the virus, data gathering is very important. You may use these suggested tools like Autoruns and Hijackthis

2. Analyze the information collected. You can make use of search engines like Google to check if a file is valid or malicious.

Not an expert? Just save the log report and let a friend with more troubleshooting experience take a look. A large community of users participates in online forums, where experts help interpret results to clean up infected computers.

3. It is easier to work in Safe Mode to avoid too many alerts coming from the Rogue Security Software.

How to boot your computer to Safe Mode with Networking:

a. Shut down your computer

b. Turn it on again

c. The moment you have hit the power button, press F8 continuously

d. Select safe mode with Networking ( make use of the up and down arrow to select that option)

e. Press Enter

f. Choose your Windows Operating System and Press on Enter

4. Remove the permission of the file.

How to Remove Permissions:

a. Right click the file

b. Click Properties

c. Click on Security Tab

d. Click Advanced

e. Remove the check on "Inherit from parent the permission entries that apply to child object......."

f. Click remove on the window that will pop-up

g. Click Okay then click Yes

h. Click Okay

5. Delete all infected files using Unlocker or the Hijackthis tool. You can also useTwinfix as an alternative for the Unlocker.

To effectively use the tools mentioned above, these few guidelines might help:

Unlocker and Twinfix are effective tools for deleting a specific file or folder saved on your computer

Example: C:\WINDOWS\system32\sbwltbxa.exe

Hijackthis is an effective tool to delete registry keys and other services.

How to Use the Unlocker tool:

a. Download and install Unlocker tool here.
b. Extract then install it afterwards.

c. Right click the each infected files and click Unlocker.

d. Click on the drop-down menu and replace "No action" with "Delete".

e. Click on Okay.

I want to be a Systems Engineer (Self Service)


This coming June will be my 3rd year with Trend Micro and I am proud to say that from the previous companies I’ve been with, Trend Micro is the best. Best people to work with, no office politics and I did not even feel that I am just an ordinary Level 1 engineer. Trend Micro is like a family to me.

I was assigned to Team Delta and I can say that I am very lucky that my mentors were Sir Balle and Ms. Julia. Our team that time was always on top and we always get excellent feedbacks (of what I’ve heard) because of what we call “Delta culture”. Culture that we need to pass on not just only to our future team mates but with other consumer teams as well. I see a lot of us grow and I am always happy for them. Seeing them grow motivated me to apply as well for “any” given opportunity. Obviously, I did not get "any" position. Funny, because I came to a point that I ended up telling myself that I am now contented as a Level 1 engineer and I just want to enjoy what I am doing.

Just one day when I woke up, a question popped up on my mind and that is—When will be the time that I'll be happy for myself?(career wise) Honestly, it's not a simple question at all. I’ve been happy ever since when it comes to love life and yet I feel that something is missing. That is—self accomplishment.

I started to evaluate myself. I tried to look back and recall those days to check what happened especially with my previous applications. I'm confident that I'm good but I started to realize that I can be great. I have overlooked what I really love to do. I do not want to answer calls for the rest of my life (lol). Then I said to myself: What you reap is what you sow

After a few months, I got an e-mail from my Team Lead, Ms. Anj about the opening and I didn't even think ignoring this opportunity. I guess it just all boils down to what I really love to do and how prepared I am to take this opportunity.

Now, I am applying for System Engineer (Self Service) because of these reasons:

1. I want to be happy for my own accomplishments so why not take the risk

2. I want to contribute my knowledge and skills in further improving the Self Service process. I believe my High CSAT will help a lot because at the end of the day, our only goal is to keep the business high and to achieve that our company needs more happy customers

3. I want to learn and discover new things

4. I am confident that I am prepared with my overall metrics

5. Lastly, I wanted a new laptop (lol)