AnimeSuki Forums

Register Forum Rules FAQ Members List Social Groups Search Today's Posts Mark Forums Read

Go Back   AnimeSuki Forum > Support > Tech Support


Thread Tools
Old 2009-04-16, 16:19   Link #1
Junior Member
Join Date: Apr 2009
Location: doesn't exist on this world.
Age: 27
Send a message via MSN to kiroisenko Send a message via Yahoo to kiroisenko
Computer Help FAQ

Additionally, this FAQ is not a substitute for seeking professional help.AnimeSuki is not responsible for your computer if anything goes wrong. i just offer advice and I'am not a substitute for taking your computer to see professional help.

PC Tech Support and Coding FAQ
Spyware information

Over the past few years, a new class of software has emerged that's up to no good. It goes by many names: spyware, adware, foistware, malware, eulaware, or even crapware. For simplicity we'll just call them all spyware. Here are some of the "features" you get from spyware. Some spyware may only use one or two of these tactics, while others do quite a bit more.
  • Deceptive functionality. Spyware often uses a classic "trojan horse" tactic--like a virus. It offers to synchronize your PC's clock or keep track of forms, but it is also doing other hidden things while you browse.
  • Home page hijacking. Did you ever find that your home page was changed, or discover new sites in Favorites that you didn't add? It might be spyware.
  • Loss of privacy. Some spyware keeps track of the web sites you visit and sends that information back to the spyware vendor. Do you want to tell everyone?
  • More advertising. Did you install a popup stopper but you are still getting popups? The ads you are getting may not be from the web site you are on, but from spyware.
  • Stolen advertising. Instead of showing the ads that should appear on a web site, some spyware substitutes its own ads which can rob a web site of revenue.
  • Broken web sites. Spyware sometimes changes the actual content on a web page, and in the process it "breaks" the page. The page may not look correct, or you may get Javascript errors.
  • Reduced performance. Spyware uses up system resources, CPU time, memory, disk space, and Internet bandwidth, making your system slower.
  • System instability. Most spyware isn't very well tested or debugged, and there is no way to report bugs or obtain tech support. The result can be system crashes, hangs, or other strange behavior.
  • Security risks. Some spyware has a built-in update feature that lets the spyware maker download and install new code to your system without your knowledge or approval.
- - - - Best Removal Tools: - - - -
- Ad-Aware SE
- spybot search and destroy 1.4

Remember to update the definitions for both before using them! Also, update defs at least once a week, otherwise your computer is NOT protected.

Also I'd like to add about spybot search & destroy , when you first install there is a way for it to monitor sites if you go to them for spyware activity ,but this ONLY works on version 1.3 ++ for spybot search and destroy..

Also when you do download it , and have it installed it would be best to immunize.. Also in the immunize section there is another program you can download called "spyware blaster" , its works very well..

Additionally, be careful with Spybot. By accident you can delete several very important files that are NOT spyware and are just encrypted files. Certain things like Microsoft Updates and Windows programs should not be deleted. Look for things like Cool2ShareSoftPLUS! and etc.

Virus Information

One of the biggest fears of having computers are viruses, viruses are malicious programs designed entirely for destruction and havoc. Viruses are created by people who either know a lot about programming or know a lot about computers.

Once the virus is made it will generally be distributed through shareware, pirated software, e-mail or other various ways of transporting data, once the virus infects someone's computer it will either start infecting other data, destroying data, overwriting data, or corrupting software.

The reason that these programs are called viruses is because it is spreads like a human virus, once you have become infected either by downloading something off of the Internet or sharing software any disks or write able media that you placed into the computer will then be infected. When that disk is put into another computer their computer is then infected, and then if that person puts files on the Internet and hundreds of people download that file they are all infected and then the process continues infecting thousands if not millions of people.

- - - - Pay Virus Scanner: - - - -
- Norton antivirus 2005 pro = buy
- Mcafee = buy

- - - - Free virus scanner: - - - -
- Avast virus cleaner
- AVG Anti-Virus System v.6.0
- Avast! 4 Home Edition v4.1.342

You can also get several free full time trials of virus scanners that are normally bought. They normally last about 30 days or so. Some such programs are AVG and McAfee. Try them out. ...But remember, just like with spyware, if you don't have a anti-virus program on your computer that updates at least once a week, your comp is NOT protected.

Trojan Information

What is a Trojan Horse?
Named after the famous Wooden Horse used by the Greeks to
conquer the city of Troy, these programs basically invade your PC disguised as a piece of desirable software. Often hidden inside the installation routines of pirate software downloaded from the internet they install themselves at the same time as the actual application and modify your system settings to ensure they are automatically run every time your PC is started up.

Trojan horses themselves seldom damage the system they infect, preferring to silently allow attackers to access your machine over the internet and do almost anything from stealing your files through to destroying your hard disk. Because they normally rely on an internet connection, PC's with cable modems or other always-on connections are especially vulnerable if infected with a trojan horse.

Regular users of IRC need to be especially wary of receiving trojan horses in files they download from other users. These often exploit bugs in the Windows operating system to make themselves appear to be harmless picture, text or zip files when in reality they are executables which will install a trojan horse on your system if run.

- - - - Best trojan remover: - - - -
- im sorry, but it's hard to find a good trojan remover.

Designed tools to remove specific virusses/trojans COMPLETLY

List of removal tools

For Trojan removal/prevention try TDS-3 (free version, but really you want to buy it) and for free virus scan, try Housecall from trendmicro. For spyware prevention try SpywareBlaster and SpywareGuard. for general diagnosis and control of startup/bho's/ect try the following:

BHO Demon
Process Viewer
Belarc Advisor

  • HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect, and optionally remove selected items. The program can create a backup of your original settings and also ignore selected items. Additional features include a simple list of all startup items, default start page, online updates and more. Intended for advanced users.
  • link:
Please note that HijackThis is also a tool you can use to get help on GUA! If you have a certain type of trojan or file infection, then HjT can help us determine what tool for you to download for specific removals. All that you need to do is to download the latest version (link above), update it, scan, and make a log. Take this saved log and post it onto GUA right in this forum and then we can find exactly what you need.

  • CWshredder is a "Coolwebsearch trojan remover." This is a small utility for removing the browser hijack CoolWebSearch and it's variants. This tool will find and destroy all traces of the CoolWebSearch (CWS) hijacker on your system. This includes:
    • Redirections to CoolWebSearch related pages
    • Redirections when mistyping URLs
    • Redirections when visiting Google
    • Enormous IE slowdowns when typing
    • IE start page/search page changing on reboot
    • Sites in the IE Trusted Zone you didn't add
    • Popups in Google and Yahoo when searching
    • Errors at startup mentioning WIN.INI or IEDLL.EXE
    • Unable to change or see certain items in IE Options
    • Unable to access IE Options at all
  • link:
    Edit - Fixed link ~Flocito
Kill2Me also, if you want to tighten windows security, and eliminate many security holes, visit, Steve Gibson has made several small free utilites for disabling raw sockets, disabling plug n play, patching/detecting windows XP holes, disabling the DCOM service, disabling windows messenger, and scanning for general security vulnerabilies. Also, the site offers a service called Shields Up! which offers a remote service port scan for your system, allowing you to find out the degree of protection your router/firewall provides.

At times, your computer may have problems connecting to the internet. This can because by something a user did or by spyware and viruses. The best tool to fix this is called Winsock Fix. One little note before using it, please remember to back up your files and settings (it is an option on Winsock Fix) before you click Fix. If you don't, you could end up screwing up your computer even worse than before.

Web Hosting
I thought I'd compile a list of some free and easy web hosting sites... I'll edit this later and add on descriptions of each. Some give images, some all types of media, and etc.
Free Firewalls for personal use include:
Kerio Personal Firewall ~
OutPost Firewall Free ~
Zone Alarm Free ~

All three prevent outbound traffic unless you allow it. The best type of firewall to have.

Free Anti-Virus programs to download and install include:
AVG Free Edition ~
BitDefender Free Edition v7 ~
Free avast! 4 Home Edition ~

Anti-Virus Online Scanners:
McAfee Free Scan ~
Panda ActiveScan ~
Trend Micro Housecall ~

Antivirus Database (Manual removal):
Mcafee Virus Database ~
Symantec Virus Database ~

If you have Windows Me or XP remember to disable System Restore before attempting to remove viruses, or you will not completely remove the virus from your system. Back up important files first.

Adware & Spyware Programs to download and install:
Adaware SE Personal ~
Spybot Search & Destroy ~
Ccleaner ~
Spyware Blaster ~

Adware & Spyware Online Scanners:
Trend Micro Anti-Spyware for SMB ~
Zone Alarm Spyware Scanner ~

Bundled Spyware and Antivirus Scanner
Hitman Pro 2.1.5 ~

(I've tried this, it's excellent and it can be installed in English. It can be configured to use both McAfee and Trend Micro's online Virus scanners but it will not replace your installed antivirus software or firewall as it is only a scanner~ Evan)

These are just a very small sample of what's available for free. There is absolutely no reason why anyone should ever pay for a personal firewall or anti-virus program. Simply choose which ones suit you the best.

I have personally used all of these programs and scanners at some point.

Backup ur WinXP product key and activation file in case u need to reinstall ur OS. (Save to a floppy disk or different partition/harddrive.)
Recover Product keys for ur MS software.
Recover System passwords and generate new ones.

Free Utility:


If you know of any other legally available programs free to home-users, pm them to me and I will add them to the list once I've checked them out. Anything for Mac would also be useful though I won't be able to test it.

Ok so i've just come up with this, inspired semi by other forums and a rather lame previous attempt by myself so here is a list of Freeware for windows, i still have more to add so bear with me.

PDF Utilities

* Adobe Reader -
* CutePDF Writer -
* PDF Explorer -

CD Burning and ISO Extraction

* DeepBurner -
* CDBurnerXP Pro -
* DuBaron cd2iso -

Compression and Encryption

* IZSoft IZArc -
* WinRAR -
* AB AxCrypt -


* SysInternals PageDefrag -

Instant Messaging

* Gaim -
* Google Talk -
* Msn messenger 7.5 -
* Aol Instant Messenger -
* Yahoo Messenger -
* ICQ -
* Trillian Basic -

Image Manipulation

* The GIMP -
* PhotoFiltre -
* Image Browser Arctic -
* Paint.NET -
* Pixia -


* Kerio Personal Firewall -
* Zone Labs ZoneAlarm -
* Agnitum Outpost Free Firewall -

Network Utilities

* AnalogX PacketMon -
* Ethereal -
* Sniphere -

Web Browsers

* Mozilla Firefox -
* Flock -
* Portable Firefox -
* Opera -
* Maxthon -
* Deepnet Explorer -
* Avant Broswer -

E-mail Clients

* Mozilla Thunderbird -
* I.Scribe -
* Koma-Mail -

Audio Players

* dBpowerAMP Audio Player -
* WinAmp -
* Quintessential Player -
* MusikCube -

Spyware Utilities

* Lavasoft Ad-Aware SE Personal -
* Spybot - Search & Destroy -
* SpywareBlaster -
* Hitman Pro -

Benchmarking and Information

* Fresh Diagnose -
* CPU-Z -


* XP-Antispy -
* FireTune -
* Fresh UI -
* Microsoft TweakUI -


* Quicktime Alternative -
* Real Alternative -
* Windows Media Player Classic -
* VideoLan -

Codec Packs

* K-Lite Mega Codec Pack -
* G.Knot Codec Pack -
* XP Codec Pack -

Office Programs

* OpenOffice -


* FreeCiv -
* Return To Castle Wolfenstein: Enemy Territory -
* America's Army -


* AntiVir -
* Avast -
* AVG Free -[/list]// WINDOWS //

Adobe® Premiere Pro® CS4

Adobe® After Effects® CS4

// APPLE //

Final Cut Pro 6

@ wecaoniddmabb789, as for Nike Dunks
I hit up
kiroisenko is offline   Reply With Quote
Old 2009-04-16, 20:30   Link #2
Senior Member
Join Date: Feb 2009
thanks for your info...
denice25 is offline   Reply With Quote
Old 2009-04-17, 03:02   Link #3
Tiberium Wolf
Senior Member
Join Date: Dec 2004
Location: Portugal
Age: 37
Codec Packs -> where's cccp? I think you are going to be killed by some ppl in here. j/k
Tiberium Wolf is offline   Reply With Quote
Old 2009-04-17, 03:34   Link #4
Join Date: Apr 2009
Nice job writing this up. Just a reminder though that Norton will give you trouble when uninstalling. Norton leaves behind traces of its memory and has even been caught with scripts to reinstall itself without permission from the user, and has been at one time labeled as a trojan.

Also, there is no best anti virus, nor there should be a ranking for it. It matters as to what you use your compute for the majority of the time it is online and how much live memory you are willing to give up for security.
Yui-da is offline   Reply With Quote
Old 2009-04-18, 12:27   Link #5
Junior Member
Join Date: Apr 2009
Location: doesn't exist on this world.
Age: 27
Send a message via MSN to kiroisenko Send a message via Yahoo to kiroisenko
Computer Terminology Facts

What is USB?
What is a Flash Drive?

What is plug-and-play?
What is hot-swapping?
What is WiFi?
What is Bluetooth?
What is a LAN?
What is a WAN?

What is USB?
Just about every computer that you buy today comes with one or more USB or Universal Serial Bus ports on the back, which support data transfer rates up to 12Mbps(Megabits per second). These USB connectors let you attach up to 127 peripheral devices on each port such as mice, modems, keyboards and printers to your computer quickly and easily. It also supports plug-and-play and hot-swapping or plugging.

A few computer manufacturers first began including support for USB back in 1996, but it wasn’t until the release of the best-selling iMac in 1998 that USB became widespread. It is eventually expected to replace the older parallel and serial ports.

USB ports now come in 2 versions, 1.0 and the newer 2.0, which is backwards compatible with 1.0. That means the older version 1.0 will work with the newer version 2.0. You can also connect USB 2.0 devices to 1.0 ports but they will only function at the older standard speeds.

What is a Flash Drive?
A flash drive is a small, portable flash memory card that plugs into a computer’s USB port and functions as a portable hard drive with up to 2GB of storage capacity. They are small enough to be carried in a pocket and can plug into any computer with a USB drive. They are more durable than an external hard drive because they do not contain any internal moving parts. They are also called pen drives, key drives or simply USB drives.

What is Plug and Play?
Plug and Play (PnP) is a capability developed by Microsoft for its Windows 95 and later operating systems that gives users the ability to plug a device into a computer and have the computer recognize that the device is there. The user doesn't have to tell the computer. In many earlier computer systems, the user was required to explicitly tell the operating system when a new device had been added by setting DIP switches, jumpers, and other configuration elements. Microsoft made Plug and Play a selling point for its Windows operating systems. A similar capability had long been built into Macintosh computers.

With Microsoft's participation, Plug and Play has now been replaced by an open, industry standard, Universal Plug and Play (UPnP), which uses Internet protocols for seamless device plug-in.

What is hot swapping?
Hot swapping is the ability to remove and replace components of a computer while it is operating. Once the appropriate software is installed on the computer, one can plug and unplug the device without rebooting. An example of this is the Universal Serial Bus (USB) that allows a user to add or remove peripheral devices such as a mouse, keyboard, or printer.

What is WiFi?
WiFi is the wireless way to handle networking. It is also known as 802.11 networking and wireless networking. The big advantage of WiFi is its simplicity. You can connect computers anywhere in your home or office on a Wireless LAN without the need for wires, with or without a wireless router and WiFi network cards. The computers connect to the network using radio signals, and they can be up to 100 feet or so apart.

What is Bluetooth?
Bluetooth is a new industrial specification for wireless personal area networks (PANs). It is the latest development in wireless technology and provides a way to connect and exchange information between devices like personal digital assistants (PDAs), mobile phones, laptops, PCs, printers and digital cameras via a secure, low-cost, globally available short range radio frequency. It is designed for low power consumption, using radio frequencies in the 2.45 GHz range to transmit information over short distances of generally 33 feet (10 meters) or less. By embedding a Bluetooth chip and receiver into products, cables that would normally carry the signal can be eliminated.

What is a LAN?
A LAN is a Local Area Network. A computer network that spans a relatively small geographical area such as in an office or at home, which share the same resources eg. printers, file servers and/or internet connections through ethernet cables or WIFI.

What is a WAN?
A WAN is a Wide Area Network. A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs). Computers connected to a wide-area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites. The largest WAN in existence is the Internet.
kiroisenko is offline   Reply With Quote

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

All times are GMT -5. The time now is 23:25.

Powered by vBulletin® Version 3.8.9
Copyright ©2000 - 2017, vBulletin Solutions, Inc.
We use Silk.