All acknolwedged, I always respect the wishes of those I assist and you are most welcome!Clean-Up with DelFix:
Please download DelFix
to your desktop.
- Right-click on delfix.exe and select Run as Administrator to launch the application.
- Referring to the image below, select the three options denoted:
- Then click on Run.
- Once it has finished processing, a notepad file named DelFix.txt will open. Post the contents in your next reply for my review.
- The log can also be located at the root of the system drive, C:\DelFix.txt.
- After you have posted the aforementioned DelFix.txt, delete it and empty the Recycle Bin.
The above application/overall process will flush old System Restore points and create a new clean one. It should also clean up and remove the vast majority of scanners used and logs created etc.
Any left over merely delete yourself and empty the Recycle Bin.Importance of Regular System Maintenance:
I advice you read both of the below listed topics as this will go a long way to keeping your Computer performing well.Slow Computer/browser?
Also so is this:What to do if your Computer is running slowlyNow some advice for on-line safety:Malwarebyte's Anti-Malware:
This is a excellent application and I advise you keep this installed. Check for updates and run a scan at least once per week.Other installed security software:
Your presently installed security application, Microsoft Security Essentials
automatically checks for updates and downloads/installs them with every system reboot and or periodically if the machine is left running providing a internet connection is active.
I advise you also run a complete scan with this also at least once per week.Keep Your System Updated:
Microsoft releases patches for Windows and other products regularly:
- Click on Start(Windows 7 Orb) >> All Programs >> Windows Update.
- In the navigation pane, click Check for updates.
- After Windows Update has finished checking for updates, click View available updates.
- Click to select the check box for any found, then click Install.
- When completed Reboot(restart) your computer if not prompted to do so.
Plus check Automatic Updates
is enabled.Check your third party software is up to date:
Certain software such as Adobe and Java related for example can be exploited by malware if it is not up-to date. I advise you consider downloading and installing Heimdal Free
. Further information about this application can be read on the download page.Be careful when opening attachments and downloading files:
1 - Never open email attachments, not even if they are from someone you know. If you need to open them, scan them with your antivirus program before opening.
2 - Never open emails from unknown senders.
4 - Beware of emails that warn about viruses that are spreading, especially those from antivirus vendors. These email addresses can be easily spoofed. Check the antivirus vendor websites to be sure.
5 - Be careful of what you download. Only download files from known sources. Also, avoid cracked programs. If you need a particular program that costs too much for you, try finding free alternatives at MajorGeeks
.Stop malicious scripts:
by Symantec or Script Defender
by AnalogX to handle these scripts.Avoid Peer to Peer software:
P2P may be a great way to get lots of seemingly freeware, but it is a great way to get infected as well. There's no way to tell if the file being shared is infected. Worse still, some worms spread via P2P networks, infecting you as well. It's really important, if you value your PC at all, to stay away from P2P file sharing programs, like utorrent, Bittorrent, Azureus, Limewire, Vuze. Criminals have "planted" thousands upon thousands of infections in the "free" shared files. Virtually all of these recent infections will compromise your Security, and some can turn your machine into a useless "doorstop".
I will further add; P2P software has the ability to create a direct conduit onto your computer, their security measures are easily circumvented, and Malware writers are increasingly exploiting them to spread their infected dross onto your computer. Further to that, if your P2P software is not configured correctly you may be sharing more files than you realise. There have been cases where people's address books, passwords, other personal, private and financial details have been exposed to the file sharing network by a badly configured P2P applications
My friendly advise is to avoid these types of software applications.Consider the below extra/layered security for your machine:Custom Host File:
A Hosts file is like a phone book. You look up someone's name in the phone book before calling him/her. Similarly, your computer will look up the website's IP address before you can view the website.
Hosts file will replace your current Hosts file with another one containing well-known advertisement sites, spyware sites and other bad sites. This new Hosts file will protect you by re-directing these bad sites to 127.0.0.1.
Here are some Hosts files:
Only use one of the above!CryptoPrevent Tool:How to prevent your computer from becoming infected by CryptoLockerWinPatrol:
WinPatrol alerts you about possible system hijacks, malware attacks and critical changes made to your computer without your permission.
Download it from here
You can find information about how WinPatrol works here
Any questions? Feel free to ask, if not stay safe!