Our new video about fake viruses

My Nerds Help With Fake Viruses

Posted in Uncategorized | Tagged | Leave a comment


We are seeing some dangerous rootkit infections lately. Many of them alter the master boot record, which effectively takes total control of a PC. Some can also create a small hidden partition on your hard drive and make it the “active” partition.

A PC user would never see this, and likely not even know they were infected. Of course many types of malware such as “trojan droppers” will download other viruses, and eventually a PC will get errors or become so slow they will realize that something is wrong.

There are many good tools to scan for rootkits, including, perhaps the best and most frequently updated TDSSKiller from Kaspersky. Users should be careful actually removing rootkits and other malware on their own, however, because they can render their PC unable to boot. Rootkits don’t go quietly, so always back up first before attempting your own repairs!

Some common examples are rootkit.boot.sst.b, Rootkit.0access.H., and ZeroAccess rootkit (Sirefef)

Posted in Uncategorized | Tagged , , , , | Leave a comment

Why people create computer viruses – seven deadly reasons

Why people create computer viruses – seven deadly reasons

By Greg Collins, CEO

One of the most common questions we get asked by our tech support customers who hire us for virus removal is this: why do people create computer viruses? The answer is a complicated one that involves psychology and the darker side of human nature.

In the interest of simplicity, the word “virus” may sometimes be referring to other types of malware including worms, trojan horses, spyware, adware, and rootkits.

The seven deadly reasons for creating a computer virus:

Boredom: Young people, in this first level of severity, can sometimes simply make poor choices. The ones with inquisitive minds sometimes try their hand at hacking, or “playfully” tinker with joke viruses.

Curiosity: They know it killed the cat, but some people just “need” to find out if their virus will spread. They don’t always realize the damage they do until the virus is “in the wild” and it’s too late.

Revenge: People with very basic coding or hacking skills sometimes join a cause and their motivation is to get back at an individual, corporation, or government.

Greed: Much of the most common malware is designed to get people to pay for bogus software, steal credit card numbers, or even get passwords to take money from bank accounts.

Power: The need for it can be a compelling and destructive force. Hacking and creating viruses to take over computers is never enough; they will always need a bigger thrill.

Aggression: When unchanneled, excessive aggressive traits can be very dangerous to humanity. Think of the videos we have all seen of baseball players with “roid rage.”

Sociopaths: The people likely to create the most destructive types of malware, although they prefer causing physical violence to animals and eventually to people.[1, 2]

Luckily, there are many tech support and antivirus companies trying to put a stop to, or at least slow down the cavalcade of new viruses. There are well over one million viruses now “in the wild.”[3] Computer repair is becoming increasingly more difficult due to rootkit and stealth viruses. To combat these threats, tech support workers must know the inner workings of various versions of Microsoft Windows and have the ability to detect malware without relying on software scanners.

The outsourcing of unqualified support technicians by many of the largest providers is certainly not helping the situation. Unfortunately, virus scanners will never be able to detect all of the current threats, especially since so many people catch them from one wrong click. http://www.youtube.com/watch?v=rnFHMjj5Ly0

Yesterday’s playful teenage hackers are today stealing billions and trying to shut down power grids.[4] [5] That said, there are plenty of “white-hat” hackers who certainly don’t mean any harm. They tend to be bright and not necessarily bad kids who can make some bad decisions, hopefully growing out of it before something bad happens. However, there are no “white-hat” computer virus coders. It is taboo for security firms to write malicious code even to test antivirus software. They are written by those who choose to destroy rather than create.


  • http://news.bbc.co.uk/2/hi/technology/7340315.stm
  • http://www.hsus.org/hsus_field/first_strike_the_connection_between_animal_cruelty_and_human_violence/animal_cruelty_and_family_violence_making_the_connection
  • Ascione, F. R. 1995. Domestic violence and cruelty to animals. Paper presented at the 4th International Conference on Family Violence, Durham, NH, July 24, 1995.
  • http://www.cbsnews.com/stories/2009/11/06/60minutes/main5555565.shtml
  • http://www.defencetalk.com/chinese-russian-hackers-probing-us-power-grid-report-17662/



Posted in Uncategorized | Tagged , , , | Leave a comment

How To Disable Javascript In Adobe Reader

Adobe Reader is a free and commonly used program. The downside is that it’s also commonly used for hacking and malware exploits. A quick and easy fix is to go to Edit, Preferences, click JavaScript at the left, and uncheck Enable Acrobat JavaScript.

Tech support tip from http://mynerds.com


Adobe Reader – Disable Javascript


Posted in Uncategorized | Leave a comment