1
  • How can a general user trace the origin of TCP/IP data generated by persistent e-mail anomaly?

    Thank you very much for taking time to consider this question. What do you recommend for a general user who needs to trace the origin and route of TCP/IP data associated with an e-mail message? My SOHO computer is infected by some form of malware. The ISP's tech support could not resolve it; the...

    Troubleshoot201415 pointsBadges:
  • Transmitting encrypted PDFs via email

    Hi! I could use some help. My company plans to send out critical data to our clients in encrypted PDF format. Is there a danger that they could be blocked in the future as virus scanners become more sophisticated and conclude that they could be carrying malware?

    ITKE345,065 pointsBadges:
  • Using the free reverse engineering malware tools in REMnux

    Hi Experts, I have seen Keith Sir's(Keith Barker)Video on REMnux. This seems to be powerful. I have somewhat understood the video. Had little queries. Kindly guide/suggest.I Just wanted to understand if this can be implemented on production as VM and scan through the infected windows...

    raviv073110 pointsBadges:
  • Malwarebytes process versus free products

    How much more effective is the malwarebytes process scanner over the normal free product? Will it detect and catch more viruses or is this just a faster way to catch the infections?

    TeachMeIT975 pointsBadges:
  • What is wanancsp.dat ?

    I am seeing a file named wanancsp.dat located at: C:UsersPublicDocumentswanancsp.dat This is on a Lenovo Thinkpad X201T running Windows 7 Ultimate x64.  I have done several general searches and have not come up with this file anywhere. Does anyone know what it is and what it's used for?

    Threeonetwo55 pointsBadges:
  • Executable has changed

    Recently I have had many alerts appear on my screen saying that an executable in that program has changed and to accept or block. What is the cause of these alerts?

    JMustwrite5 pointsBadges:
  • Tidserv request 2 attack: Virus or malware?

    Norton is giving me a message saying a tidserv request2 was block, is this a virus or malware infection?

    Reggies90 pointsBadges:
  • Connect to a Vista laptop in the field without any remote software.

    How can we connect to a remote laptop running Vista Pro in the field to run an AV scan and a Malwarebytes scan? Can we initiate this over the net without any preinstalled software?

    Karl Gechlik9,860 pointsBadges:
  • Have you tried Microsoft Security Essentials?

    Microsoft Security Essentials was released last week -- have you tested it? Are you planning on implementing it? If not, what antivirus/antimalware package do you use?

    JennyMack4,280 pointsBadges:
  • Looking for an effective network Anti virus software thats not a resource hog

    Does anyone out there have any experience or knowledge regarding the effectiveness of a product by Sunbelt Software named VIPRE Enterprise

    Ljpilot110 pointsBadges:
  • File extension and file header mismatch detection

    Does anyone have a utility to find file header to file extension mismatches? For example, INI files where the first two bytes are "MZ" would be a mismatch.

    Rklanke1,250 pointsBadges:
1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following