Hi Chad,
In windows 7, I am using Microsoft security essential as my main protection, and Malware bytes as a second opinion; i.e., the live protection is set to off.
Ub windows 8 I have AVG as my main protection.
In both computers I use spybot.
Here is a copy of my email to my family and friends which I sent yesterday, which is urgent:
Aloha family and friends,
This only took me about 10 minutes.  It should take you less.
Download and run the following:
http://www.rapid7.com/resources/free-security-software-downloads/universal-plug-and-play-jan-2013.jsp
You will need your ipaddress for all your computers on the network if you have more
than one computer.
To do this
press window key plus the letter r
then type cmd and enter
then type ipconfig and enter
your address will look like 192.188.300.4
the router or modem will have the same number but ending in 1
Robins computer has the same number but ending with 6,
so I entered 192.188.300.1  and 192.188.300.6 for the range to be scanned.
You need to click on the result window and scroll to the end for the results.
Here is a copy of our  results:
Exploitable
Identified
0
0
Want to scan for more vulnerabilities? Download the free
Nexpose Community Edition
I passed the test.
CAN YOU?
If your results indicate that you are at risk,
than go to your network properties and disable the plug and play feature found to
be at risk.
May The Force be with you,
Manny
I got this info from:
Warning: New Hack Threat Leaves Millions at Risk of Cyber Attack
Text Size
Published: Tuesday, 29 Jan 2013 | 1:11 PM ET
cyber-hacker-180.jpg
The U.S. Department of
Homeland Security
urged computer users on Tuesday to disable a common networking technology feature, after researchers warned that hackers could exploit flaws to gain access to tens
of millions of vulnerable devices.
The U.S. government's Computer Emergency Readiness Team advised consumers and businesses to disable a feature known as Universal Plug and Play or UPnP, and some other related
features that make devices from computers to
printers
 accessible over the open Internet.
(
Read More
:
 Pentagon in Major Expansion of Cybersecurity Force
 )
UPnP is designed to let networks identify and communicate with equipment, reducing the amount of work it takes to set up networks. Dave Marcus, chief architect of advanced research and threat intelligence with Intel's McAfee unit, said hackers would have
a "field day" once the vulnerability in network devices is exposed.
"Historically, these are amongst the last to be updated and protected properly which makes them a gold mine for potential abuse and exploitation," said Marcus, who advises government agencies and corporations on protections against sophisticated attacks.
Computer security
company Rapid7 said in a white paper released on Tuesday that it discovered between 40 million and 50 million devices that were vulnerable to attack due to three separate sets of problems that the firm's researchers have identified with the UPnP standard.
(
Read More
:
Former US Spy Warns on Cybersecurity
 )
The flaws could allow hackers to access confidential files, steal passwords, take full control over PCs as well as remotely access devices such as webcams, printers
and
security systems
, according to Rapid7.
It has alerted electronics makers about the problem through the CERT Coordination
Center, a group at the Carnegie Mellon
Software Engineering Institute
 that helps researchers report vulnerabilities to affected companies.
Government Warns of Hack Threat to Network Gear
CNBC's Jon Fortt reports on a battle going on over cyber security involving universal plug & play technology. Apparently, a flaw in the protocol opens the digital door
to hackers. Security experts are recommending users disable plug & play.
CERT in turn has tried to contact the more than 200 companies identified, including
Belkin, D-Link, Cisco Systems Inc's Linksys division and Netgear.
Representatives for Belkin, D-Link, Linksys and Netgear did not immediately responded
to requests for comment.
Chris Wysopal, chief technology officer of
security software
firm Veracode, said he believed that publication of Rapid7's findings would draw widespread attention to the still emerging area of UPnP security, prompting other
security researchers to search for more bugs in UPnP.
(
Read More
:
Code Wars: America's Cyber Threat
 )
"This definitely falls into the scary category," said Wysopal, who reviewed Rapid7's findings ahead of their publication. "There is going to be a lot more research on
this. And the follow-on research could be a lot scarier."
A source with a major networking equipment maker confirmed on Monday they had been
alerted to the problem, and that companies were preparing to respond.
"This is the most pervasive bug I've ever seen," said HD Moore, chief technology
officer for Rapid7. He discussed the research with Reuters late on Monday.
Taking Control
Moore said that there were bugs in most of the devices he tested and that device
manufacturers will need to release software updates to remedy the problems.
He said that is unlikely to happen quickly.
In the meantime, he advised computer users to quickly use a free tool released by Rapid7 to identify vulnerable gear, then disable the UPnP functionality in that equipment. Moore said hackers have not widely exploited the UPnP vulnerabilities to launch attacks, but both Moore and Wysopal expected they may start to do so after the findings are
publicized.
Still, Moore said he decided to disclose the flaws in a bid to pressure equipment
makers to fix the bugs and generally pay more attention to security.
People who own devices with UPnP enabled may not be aware of it because new routers, printers, media servers, Web cameras, storage drives and "smart" or Web-connected
TVs are often shipped with that functionality turned on by default.
"You can't stay silent about something like this," he said. "These devices seem to have had the same level of core security for decades. Nobody seems to really care
about them."
Veracode's Wysopal said that some hackers have likely already exploited the flaws to launch attacks, but in relatively small numbers, choosing victims one at a time. "If they are going after executives and government officials, then they will probably
look for their home networks and exploit this vulnerability," he said.
Rapid7 has released a tool to help identify those devices on its website at
www.rapid7.com
checkout:
http://www.youtube.com/watch?v=75fbevlz10g

Good luck, Manny
checkout my stand-up comedy performance http://www.youtube.com/watch?v=75fbevlz10g computer specifications: Window Eyes 8 Dell xps420 with 8 gb memory c p u: Intel q6600 quad core dual boot between Windows 7 64-bit and windows 8 64 bit all software and drivers are up to date
On 2/5/2013 2:49 AM, chad baker wrote:
> hi is there any free antimalware removal programs
> i tried super antispyware but the latest version isn't accessible
> the installer is a bunch of check boxes which window eyes don't read
> thanks
> If you reply to this message it will be delivered to the original sender only. If your reply would benefit others on the list and your message is related to GW Micro, then please consider sending your message to [email protected] so the entire list will receive it.
>
> GW-Info messages are archived at http://www.gwmicro.com/gwinfo. You can manage your list subscription at http://www.gwmicro.com/listserv.
>
>
>
If you reply to this message it will be delivered to the original sender only. 
If your reply would benefit others on the list and your message is related to 
GW Micro, then please consider sending your message to [email protected] so 
the entire list will receive it.

GW-Info messages are archived at http://www.gwmicro.com/gwinfo. You can manage 
your list subscription at http://www.gwmicro.com/listserv.

Reply via email to