{"id":2414,"date":"2011-07-17T12:39:06","date_gmt":"2011-07-17T16:39:06","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=2414"},"modified":"2011-07-18T17:43:41","modified_gmt":"2011-07-18T21:43:41","slug":"panic-trumps-knowledge","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/panic-trumps-knowledge\/","title":{"rendered":"Panic trumps knowledge"},"content":{"rendered":"<p>There&#8217;s a change taking place on the Internet &#8211; and it has nothing to do with  the exodus to the Cloud. It is darker and more sinister than that. As those of  us using the Internet become smarter, as security software becomes increasingly  more sophisticated, as more and more of us take the time to learn about the  important, yet strange world of the Internet &#8212; those who would try to trick us  have had to come up with new ways to do it.<\/p>\n<p>It used to be that criminals  and greedy companies without scruples could make a flashy smiley program &#8211; or  another seemingly useful free program &#8211; and entice us to download it simply by  putting a FREE sign up. But as the Web is maturing, so are those who use it.  Companies like FunWebProducts are seeing fewer and fewer downloads &#8211; they now  rely on brand new users for victims. Those who have been on the Web a few years  are wiser &#8211; more suspicious, and they have learned too well the true price of  free.<\/p>\n<p>So what are criminals and greedy companies without morals to do?  They have found a new way to surprise and trick the unsuspecting. It&#8217;s called  scareware by some &#8211; and rogue security software by others. Almost every one of  us would be concerned if we were browsing the Web and suddenly we are confronted  with a message that looks like it&#8217;s coming from our own computer or our own  security programs saying we are infected with a terrible Trojan or virus or some  other malicious software program. And what&#8217;s the typical reaction? Exactly.  Panic. And the criminals know this. How many of us really think when we panic?  Not many. Panic induces reaction &#8211; not thoughtful action.<\/p>\n<p>The most  ubiquitous threat you face on the Internet today is not spyware, viruses,  Trojans or adware, it&#8217;s scareware. We&#8217;ve encountered it, our children have  encountered it, many of you have encountered it, and if you haven&#8217;t encountered  it yet, if you do much Web browsing, you&#8217;ll encounter it.<\/p>\n<p>But if you&#8217;re  prepared and you understand the nature of scareware &#8211; which should be called  panicware actually &#8211; the less likely you&#8217;ll panic when you encounter it. So here  are some tips to help you should you encounter panicware\/scareware\/rogue  security software.<\/p>\n<p>1. NEVER ASSUME<br \/>\nNever assume that any warning that  suddenly appears on your screen is valid. Always assume it&#8217;s scareware. Take  your time and look at the warning. If it is a genuine warning from your security  software the name of your security software &#8211; like Microsoft Security  Essentials, SUPERAntiSpyware, Avast, etc &#8211; will be displayed on that dialog.  Some scareware\/rogues use Windows-sounding names like Windows AntiVirus 2011 or  XP AntiVirus 2010. Those won&#8217;t be the names of any security software you are  using. Those are rogues. So your first reaction when a warning suddenly and  unexpectedly appears warning that your computer is infected should be skepticism  &#8211; not panic. Remain calm and do not panic. It&#8217;s your computer we&#8217;re talking  about &#8211; not your heart, OK? You first thought should be it&#8217;s a hoax &#8211; it&#8217;s  &#8220;scareware!&#8221;, your initial reaction should not be &#8220;Oh my goodness, I&#8217;m  infected!&#8221; Panic never leads to good things. Don&#8217;t panic.<\/p>\n<p>2. NEVER CLICK  WITHOUT THINKING<br \/>\nMost rogues will display wording like &#8220;Your computer is  infected with __________ (fill in the blank with some realistic,  malicious-sounding name). Click the Scan button to scan your computer now. Don&#8217;t  click. Think. Don&#8217;t click anything. Don&#8217;t click the &#8220;x&#8221; in the top right corner.  Don&#8217;t click &#8220;No Thanks!&#8221; Don&#8217;t click &#8220;Continue without scanning&#8221;. Don&#8217;t click  &#8220;Click here to remove this threat&#8221;. Don&#8217;t click anything. Shut down your  browser, and if you can&#8217;t, open Task Manager by right-clicking on an empty space  in your toolbar and choosing Task Manger from the menu. Click the &#8220;Processes&#8221;  tab and find the browser&#8217;s process. If it&#8217;s Internet Explorer it will be  iexplore.exe. If it&#8217;s Firefox it will be firefox.exe. If it&#8217;s Chrome it will be  chrome.exe. Right-click on your browser&#8217;s process (or any one of them if there  are more than one) and choose &#8220;End process tree&#8221; &#8211; ignore the warning Windows  gives you about losing data. If the browser window with the scareware\/rogue in  it does not close, there must be another browser process running, right-click it  and end its process tree. If you cannot access Task Manager or you can&#8217;t shut  down your browser any other way, use the power switch on your computer to shut  down Windows. Shutting down Windows will close everything &#8211; including all  browser windows. But it&#8217;s a lot easier to restart Windows than it is to get rid  of scareware\/rogue security software.<\/p>\n<p>3. DON&#8217;T PANIC TWICE<br \/>\nIf the  worst happens and you do panic, don&#8217;t panic twice. Panicking twice will only  cause more problems and might cost you money. Scareware\/Rogues offer to clean  and fix your computer &#8211; ridding it of those imaginary Trojans and malicious  files it said you were infected with &#8211; but never really were. Don&#8217;t fall for  that ruse. Don&#8217;t panic twice. Think and follow these simple  instructions:<\/p>\n<p>Shut your computer down using the power switch (It&#8217;s OK  it&#8217;s not going to kill your computer like it used to with Windows 95\/98)<\/p>\n<p>Boot into Safe Mode by tapping the F8 key continuously while Windows is  booting. Choose Safe Mode with command prompt.<\/p>\n<p>When Safe Mode with command prompt has loaded, you&#8217;ll be staring at a black screen. You&#8217;ll see a C:\\  prompt. It may say C:\\Widnows or something else. You&#8217;ll see a flashing cursor.<\/p>\n<p>At the cursor type RSTRUI.EXE and press the enter key.<\/p>\n<p>Go grab  some coffee and wait while Safe Mode loads the System Restore User Interface.  When it appears find a restore point from the previous day &#8211; before the  scareware attack, and restore your computer using that restore point. The  scareware will be gone and your computer will be back to the way it was before  the attack. It will be as if it never even happen.<\/p>\n<p>The more you know, the  safer you are. Remember the panic can trump your knowledge. Don&#8217;t panic.  Think!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There&#8217;s a change taking place on the Internet &#8211; and it has nothing to do with the exodus to the Cloud. It is darker and more sinister than that. As those of us using the Internet become smarter, as security software becomes increasingly more sophisticated, as more and more of us take the time to learn about the\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/panic-trumps-knowledge\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,10],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/2414"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=2414"}],"version-history":[{"count":2,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/2414\/revisions"}],"predecessor-version":[{"id":2429,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/2414\/revisions\/2429"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=2414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=2414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=2414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}