Practical Malware Prevention
()
About this ebook
Practical Malware Prevention provides readers with information on how to keep a healthy computer system. Using free tools in a Windows environment, the author shows you how to remove and prevent: viruses, malware, ads, spyware, etc.
The book is rounded out with tips, tricks, & optimization techniques that will leave a computer system feeling like new again.
The book includes links to the best free software and web resources when it comes to malware protection and prevention. A great book to have from beginners to advanced users.
Related to Practical Malware Prevention
Related ebooks
Protect Your Personal Information Rating: 0 out of 5 stars0 ratingsSoftware Security For You Rating: 0 out of 5 stars0 ratingsEthical Hacking: A Comprehensive Beginner's Guide to Learn and Understand the Concept of Ethical Hacking Rating: 0 out of 5 stars0 ratingsWindows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8 Rating: 4 out of 5 stars4/5Cyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies) Rating: 0 out of 5 stars0 ratingsOnline Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsHack Proofing Your Network Rating: 0 out of 5 stars0 ratingsWindows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7 Rating: 4 out of 5 stars4/5Computer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners Rating: 0 out of 5 stars0 ratingsPractical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware Rating: 0 out of 5 stars0 ratingsAn Ultimate Guide to Kali Linux for Beginners Rating: 3 out of 5 stars3/5Hacking of Computer Networks: Full Course on Hacking of Computer Networks Rating: 0 out of 5 stars0 ratingsWeb Penetration Testing: Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsManaged Code Rootkits: Hooking into Runtime Environments Rating: 5 out of 5 stars5/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsCommon Windows, Linux and Web Server Systems Hacking Techniques Rating: 0 out of 5 stars0 ratingsThe Antivirus Hacker's Handbook Rating: 0 out of 5 stars0 ratingsMobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratingsCuckoo Malware Analysis Rating: 0 out of 5 stars0 ratingsContemporary Digital Forensic Investigations of Cloud and Mobile Applications Rating: 0 out of 5 stars0 ratingsAVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsKali Linux CTF Blueprints Rating: 0 out of 5 stars0 ratingsPenetration Testing: Protecting networks and systems Rating: 0 out of 5 stars0 ratingsLearning Network Forensics Rating: 5 out of 5 stars5/5Digital Forensics A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCertified Cyber Forensics Professional The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsSeven Deadliest Social Network Attacks Rating: 0 out of 5 stars0 ratings
Security For You
Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Practical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Rating: 0 out of 5 stars0 ratingsGame Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Amazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Security+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsIAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratings
Reviews for Practical Malware Prevention
0 ratings0 reviews
Book preview
Practical Malware Prevention - Michael Kelley, Jr
Copyright © 2015 Michael L. Kelley Jr. All rights reserved.
Printed in the United States of America.
For my daughter, Harper. I love you.
I miss you, but the memories are easy to find. I love you Gram.
Contents
Preface: 8
Chapter 1: Virus, Worm, Trojan 10
Chapter 2: Back It On Up 22
Chapter 3: Autoruns 28
Chapter 4: Temporary File Cleansing 35
Chapter 5: Malware Really Bites! 40
Chapter 6: Rootkits 45
Chapter 7: Web Browsers 48
Chapter 8: Defragging 52
Chapter 9: Updates 56
Chapter 10: Software Routine 60
Chapter 11: Service Config 65
Chapter 12: File Extensions 68
Chapter 13: Keyboard Shortcuts 76
Chapter 14: Command Line 90
Chapter 15: Port List 94
Chapter 16: Passwords 98
Chapter 17: Software/Links 103
Chapter 18: Afterward 121
About the Author
Michael Kelley Jr. lives in Southwestern Pennsylvania with his fiancé and their 1 year old daughter. Michael is a graduate of California University of Pennsylvania and holds degrees in computer science and criminal justice. He works as a computer technician for one of the largest public school districts in the county. He is in contact with many various computer systems on a daily basis. Thanks to his parents, he got into computers when he was in 10th grade and hasn’t looked back since. Starting with basic technical support, he moved into programming and has even developed smartphone applications. His interests include: computer security, game programming, passwords, computer forensics, thrift shopping, and photography. He writes on his blog at: http://abitofabyte.blogspot.com/. He can be contacted directly via email at: pghcomputertech@gmail.com.
Preface
Do you feel like your computer used to be way faster? Wonder why it is so bogged down? Tired of waiting five minutes just for a program to open? This book is intended to be a learning guide into the world of malware prevention. Using this book, readers will be able to identify various threats that slow down a computer system. Using free tools, readers will be able to find such threats and eliminate them from their systems.
Once completed, readers will also learn techniques to speed up the Windows operating system. No more waiting forever for a computer to fully boot. No more ads or pop-ups. No more lengthy virus scans where after, the problem returns.
Included at the end of this book will be valuable resources and a list of all the software tools used. You can download the software (Chapter 17) prior to reading through the book to be able to follow along.
I hope you enjoy reading this and can take away a few key lessons from it.
~Michael
Computers don’t understand body language so you have to deal with them in a different way than you do with people.
Professor Donald Knuth, 1981
Chapter 1: Virus, Worm, Trojan, Oh My!
Ever wonder why your computer felt faster than it does now? Tired of paying someone high fees to fix your computer only for the problem to come back? Wish you knew more about what was going on inside of that mysterious computer case? Want free ways to instantly speed your computer up? Well look no further! This chapter is going to be a quick introduction on why your computer tends to slow down over time.
I remember getting our first powerful computer at home when I was in 10th grade. It was a Dell desktop system that my dad special ordered. I was addicted. I spent many restless nights on our dial-up connection getting acquainted with Windows. It was tons