Lnk url b Trojan program. We keep the computer clean and clean the PC from Trojans manually. Information for corporate investors

In the previous articles in the cycle of cleaning the computer, we talked about two things: how to clean the PC from the middle, and how to prevent infection during the installation and adjustment of programs.

advertising

However, such outbursts may also occur if the hydota has already climbed through. Therefore, after applications from the hall, we heard about the process. So, why didn’t you notice, and what a waste of money still ended up on your computer? And why?

Are you infected?

... There is a popular thought in the category “if you don’t install antiviruses, then there won’t be viruses.” Those who are far from the truth, say the truth, because we are talking about a Windows computer, and Windows is installed on the absolute majority of PCs and laptops. Obviously, by installing Linux, you will automatically save yourself tens of thousands of Trojans, but due to the reliability of the OS, it is still far from Windows to blame for all its unforeseen advantages.

So, there will be viruses, but not just a lot of stench: malicious Trojans, bad codes, phishing sites and adware programs... And the end of it is not visible, however, with every fate, the number of willing naughty people is growing in geometric progress ii. Guess what would have happened, if only ten fates had passed: such a great miracle would not have happened.

The presence of an “expensive and super-duper-cool” antivirus package – or a package Internet Security– every time it doesn’t protect you 146% of the time. Adware (advertising infections) and malware (Trojans and others) have already begun to penetrate the computer, bypassing all protections, and no matter how cool a system administrator you are, don’t get too caught up: in the author’s memory, the richest hackers i. Why?

Because there is no protection from the gasket between the keyboard and the chair: from a regular computer.

ESET, a leader in the development of anti-virus software, announces that the threat of Trojan programs JS/TrojanDownloader.Pegel has been detected in its security alert system ThreatSense.Net .BR.
This free software is a script that is delivered to web sites and automatically redirects browsers to infected sites. After this, it is expected that malicious code will be exposed and eliminated on unprotected computers. This threat, named by ESET hackers as JS/TrojanDownloader.Pegel.BR, is spreading across Europe at an even rapid pace. The hundredth equivalent of the total number of infected computers is now 2.29%, which ensured the Trojan's fifth place in the global threat rating. Regardless of the fact that the useless program JS/TrojanDownloader.Pegel.BR has not yet begun to expand in Ukraine, ESET representatives strongly recommend that Ukrainian merchants be very careful when acquiring files from the Internet, and also update the product and ESET NOD32 Antivirus ESET Smart Security up to version 4.2 to ensure maximum protection for your computer.
The current Conficker family will no longer be active. Win32/Conficker, every month, wipes out the palm of the palm of the middle of the cheap software in the world (9.79%) and Ukrainian (19.42%) threat ratings. This borderline is expanded due to the additional influence of the Windows OS, which is located in the remote procedure call (RPC) subsystem, as well as through unprotected secretly accessible folders and sensitive information carriers. The INF/Conficker threat, another representative of the family, is also becoming more widespread. The vikoryst file autorun.inf, this useless program, contains all the remaining variations of the Conficker virus for infecting PCs. A large number of infected computers around the world and in Ukraine, for example (1.47% and 1.66% of all cases), ensures this threat has a leading position in the ratings of cheap software.
ESET representatives strongly recommend that users securely steal specific data, as long as they do not compromise their positions with threats such as Win32/Agent, Win32/PSW.OnLineGames and Win32/Tifaut, which are considered to be confidential. ї information. Users should also beware of the crappy INF/Autorun software, which prevents autorun on other media and launches crappy programs immediately when the media is connected. information about the computer, as well as the “new product” of last month - Win32/Sality, which is a polymorphic virus, modifies EXE and SCR files and includes antivirus programs.
The beginning of summer could not help but please the inhabitants of the country with new viruses. In the TOP 10 world rating there are two “new products” presented as threats - Win32/Qhost (1.16%) and HTML/ScrInject.B (0.84%). Win32/Qhost Trojan is asking for help everywhere by e-mail It gives hackers access to infected computers. Before launching, this threat copies itself to Windows folder%system32%, after which it modifies the host file to redirect traffic to the malicious domain. The HTML/ScrInject.B threat detects HTML web pages from a hidden script or IFRAME tags that trigger automatic redirection to the site Discount programs.
According to ESET experts, due to the increase in Internet hacking and the sophistication of virus writing technologies, computer users must be extremely careful when working on the Internet, as well as when vicorising significant noses information. To effectively protect your special data and confidential information, ESET's backup agents recommend regularly updating operating system, and use reliable anti-virus solutions with up-to-date signature databases to ensure comprehensive protection of your computer.

HTML/ScrInject.B.Gen– this is an infection that your security tool can detect before you do. Most often it appears on various web sites. Consider these web sites to be unreliable and want useless software. In some cases, the website may be cleaned, but your security tool will, as before, notify you about the presence of HTML/ScrInject.B.Gen. Of course, you must still be very careful all the time, since the advances may be fragmented. Luckily HTML/ScrInject.B.Gen don’t enter systems. Vzagali seem to be the script that is available on the trash site only because of everything, you will not see and need to delete HTML/ScrInject.B.Gen from your system. Unfortunately, this does not mean that this threat cannot be eradicated from the system, so we assume that you are still reading this article and learning more about it, regardless of those who do not need to delete HTML/ScrInject.B. Gen.

How do HTML/ScrInject.B.Gen work?

HTML/ScrInject.B.Gen is working on corrupted web pages. If the customer navigates to such a page, this script will immediately try to redirect the customer to other web pages that may be harmful security software. It was also stated that HTML/ScrInject.B.Gen can capture untrusted files on computers. If the infection site is HTML/ScrInject.B.Gen, the web site may also be labeled as a pop-up. It is not your fault to press on the leaking windows because you do not know what the smell is. If you suspect that you have become a victim of HTML/ScrInject.B.Gen, you must carefully scan your system for unwanted programs. You can also try to identify these bad programs on your own, but you also have to know that it is very important to work in order to earn money. As we already guessed, you do not need to uninstall HTML/ScrInject.B.Gen just because only the site is corrupted. In fact, only website administrators can implement HTML/ScrInject.B.Gen options.

What can I do to steal my system?

If you don't want to become one of the victims of HTML/ScrInject.B.Gen, you will always have to become more expensive on the Internet with your firewall turned on. Otherwise, security agents are advised to install a security system in the system and monitor it thereafter. Thirdly, you must follow the so-called healthy mind, look at the core principles, for example, you must avoid dubious sites, do not use security software on unknown third-party web sites, and do not Open the attachment to prevent spam. It is also advisable to completely ignore the message if you do not know where the stench will lead you. As we honor our wishes, we thank you that you will not face any threats to the future.

How can I view HTML/ScrInject.B.Gen?

As we have already told you, it is not possible to delete HTML/ScrInject.B.Gen because it simply does not exist on your system. Instead, in order to implement HTML/ScrInject.B.Gen, you will need to navigate through unknown web pages. If you want to make sure that other threats are not installed on your computer, you can scan your system with a free automatic scanner. Only 100% reliable tools can detect infections, so be sure to download and install a 100% reliable scanner.

our recommended software:

HTML/ScrInject.B.Gen.

SpyHunter4 Anti-Malware Plumbytes Anti-Malware

Windows that suffered from HTML/ScrInject.B.Gen

  • Windows 10 28%
  • Windows 8 32%
  • Windows 7 21%
  • Windows Vista 7%
  • Windows XP 12%

Get ready! Numerous anti-virus scanners have simply revealed the possibility of malicious programs associated with HTML/ScrInject.B.Gen.

Anti-Virus SoftwareVersionDetection
Dr.Web Adware.HTML/ScrInject.B.Gen
Qihoo-3601.0.0.1015 Win32/Virus.RiskTool.HTML/ScrInject.B.Gen
Kingsoft AntiVirus2013.4.9.267 Win32.HTML/ScrInject.B.Gen
McAfee5.600.0.1067
VIPRE Antivirus22702 HTML/ScrInject.B.Gen
Baidu-International3.5.1.41473 PUP.Win32.HTML/ScrInject.B.Gen
NANO AntiVirus0.26.0.55366 Trojan.Win32.Searcher.HTML/ScrInject.B.Gen
VIPRE Antivirus22224 HTML/ScrInject.B.Gen.Generic
ESET-NOD328894 Win32/HTML/ScrInject.B.Gen
McAfee-GW-Edition2013 Win32.Application.HTML/ScrInject.B.Gen
Malwarebytesv2013.10.29.10PUP.HTML/ScrInject.B.Gen
K7 AntiVirus9.179.12403 Unwanted-Program (HTML/ScrInject.B.Gen)
Malwarebytes1.75.0.1 PUP.Optional.HTML/ScrInject.B.Gen

HTML/ScrInject.B.Gen global trends by country

our recommended software:

There are a lot of good anti-malware software's with high detection ratio. HTML/ScrInject.B.Gen.

SpyHunter4 Anti-Malware Plumbytes Anti-Malware