Did you know: In May 2013 - 14,715 visitors from 121 countries visited this website.
What is the Online Computer Tech Support from Comprolive.com like ?
I started this website with the sole purpose of helping my friends to enable them to get rid of viruses from their computers themselves. I never worked in any company except for a brief time looking after computers in a Internet Cafe of a friend. Although my formal education is in Computers/ Electronics. I did a lot of things unrelated to my line of education.
Here I am trying to help people. Now technology has evolved so that it is possible for me to take a look at your computers and guide you personally for removing viruses, in case you are not proficient enough to do it your self. My effort is to teach you how to detect and remove viruses, so that next time you would be able to do it yourself.
My preferred method is as follows.
First I ask you to download a small free software called TrendMicro HijackThis - download link, It creates a report in which all the processes running on your computer, as well as their corresponding registry entries are listed. A look at this report gives an experienced tech support guy a fair idea about presence of any malicious virus files on your computer.
I will then mail you back the details of the virus files, and encourage you to delete them yourself.
I also look at the security software installed on your computer, which are mentioned in this report, and suggest you any missing software if not installed. I recommend Free software, antivirus/ firewall/ temp files cleaner etc, so there is no extra burden of purchasing them.
Often I recommend to run/ schedule a Boot Scan using the antivirus software on your computer. This helps to effectively eliminate virus files. One software is my favorite, it is CCleaner - download link, I recommend you to run the Cleaner and the Registry menus on CCleaner so that all the junk files in the Temp folders and obsolete registry keys are removed.
If you are still using XP/ Vista/ Windows 7, then I would recommend you to install a good Free Firewall software like the Comodo Firewall (standalone) - download link, It provides much needed online protection for windows.
Of course if you already have Internet Security suite with all the above features included, then you do not need to install additional software.
An antivirus program can not prevent or detect all the malware/ virus files as there are new malware created almost daily.
So sometimes an experienced tech support guy can find out any undetected malicious files. We can be in touch via Google Talk, audio/ video chat and through mobile phone if needed. ( of course you have to call my number if needed! )
I would be normally available between 10am to 10pm (IST) Indian Standard Time.
In case you need to get things done remotely, then we can arrange a remote desktop sharing session and try to find and remove the viruses.
Now about the Economy
As you may already be aware that reliable online Tech support does not come cheap. Recently I noticed online Tech support service started by Microsoft charges $100 US Dollars for one hour of online virus removal service.
I am aware of the individual economy of vast number of computer users around the world, and not everyone is sailing in the same boat. Therefore I have divided my charges in three groups.
1) If you are from the US, Europe, Japan, Korea or any of the developed countries
a) If you are well to do person from these countries, and can afford to pay for the service - I expect you to pay equivalent of $20, (Twenty US Dollars) one time charge for detection and removal of viruses - no matter how long it takes ( normally say 2 Hours)
b) If you are in lower income group in these countries the $10 (Ten) US Dollars will do.
2) If you are from Indian subcontinent, Africa, Eastern Europe, Russia, south America or from any other low income countries
a) If you are a well to do person from any of these countries - I expect you to pay me at least equivalent of $10 for the same service as above.
b) If you are in a lower income group in these countries then $5 (Five) US Dollars will do.
My preferred method of receiving money is through PayPal. That will require for you to have an account with PayPal. Let me know in advance if you don't.
3) If you are a student/ unemployed or in dire straits - I would expect you to make at least 5 new subscribers for my YouTube channel / Google+ from your town (including yourself). So we can call this a barter system.
The Barter System
We can extend the barter system if that suits you. In case you have a website/ a blog/ a youtube channel. We can arrange to place a link to my website/ my youtube channel on yours for exchange of online Tech support. Or you can write an introductory article in your blog about my website. So let me know if you have anything to offer as a barter.
You can contact me on support(at)comprolive.com or sanjayrajure(at)gmail.com
Last Updated on Tuesday, 11 December 2012 14:09 Tuesday, 11 December 2012 13:41
Yesterday it seems was a busy day for some Pakistani hackers, as the news spread that they have managed to hack into several government websites from Bangaladesh, several websites in China and several in India.
I will focus on the hacking of the Indian websites. It seems that these are all websites hosted on the servers of a particular web host in the United states. The server was running on Microsoft IIS web server software.
The hackers seem to have gained access to this server and created an additional page on each of these affected websites.
I checked the "Whois" information of some of these sites and noticed that all of them seem to be hosted on the following server
IP : 18.104.22.168
IP Location:Texas - Dallas - Softlayer Technologies Inc.
Server Type: Microsoft-IIS/7.0
The pages are created in the following manner
Where this sp.html is spiced with an animated image and some boasts. The home pages of these sites are not affected. Probably the web maintainers/ owners of these sites would never notice that they were hacked if the Web hosting company removes these sp.html pages from the affected websites and remove any other code they may have added to the web pages on these sites.
Last Updated on Monday, 10 September 2012 08:27 Saturday, 14 May 2011 19:15
Hackers and virus makers do not miss an opportunity to entice you t download viruses hidden in some form of a news, video, image downloads. Always be careful to browse the internet using some kind of a Site advisor browser plugin and if there are any downloads then do not open them before scanning with some antivirus program.
There are some Bin Laden photos available on the internet for download. When you download this file and run it on your computer, it creates several files on your computer possibly some images and also installs a malicious file which resembles to Google Toolbar notifier. You may mistake this malicius file as a legitimate file. See this article for details.
Last Updated on Friday, 14 September 2012 12:09 Thursday, 30 September 2010 14:49
binaryplanting.com is the official web site for the extensive Binary Planting/DLL load hijacking research conducted by ACROS Security. The research was focused on various types of vulnerabilities where an attacker can place a malicious file through a malicious website on a users computer and then execute it by some vulnerable application.
Their research has revealed that Internet Explorer users are more vulnerable to binary planting/ DLL load hijacking attacks than other browsers such as FIrefox or Google Chrome , see report
The site offers to test your computer and your network for exposure to Internet-based binary planting/ DLL load hijacking attacks
Last Updated on Friday, 14 September 2012 16:06 Wednesday, 29 September 2010 11:18
Spams are a part of our daily life. Fortunately they are filtered in time. But sometime they may make into your inbox. Therefore it is helpful to know about current spam campaigns. One such campaign that was detected at Cisco Security by Henry Stern.
It reads "Cyber criminals sent spam email messages targeting users of the LinkedIn social media community. This is the largest such attack known to date. In the attack, victims are emailed an alert that contains a link with a fictitious social media contact request. This morning, these messages accounted for as much as 24% of all spam sent within a 15-minute interval. Clicking the link takes victims to a web page that says, “PLEASE WAITING…. 4 SECONDS,” and redirects them to Google. During those four seconds, the victim’s PC is infected with the ZeuS data-theft malware via a drive-by download. ZeuS embeds itself in the victim’s web browser and captures personal information, such as online banking credentials, and is widely used by criminals to pilfer commercial bank accounts. " You can read the article by Henry Stern on Cosco Blog on this link.
I will also post updates on this issue as and when they appear.