Practical Malware Prevention
()
About this ebook
Practical Malware Prevention provides readers with information on how to keep a healthy computer system. Using free tools in a Windows environment, the author shows you how to remove and prevent: viruses, malware, ads, spyware, etc.
The book is rounded out with tips, tricks, & optimization techniques that will leave a computer system feeling like new again.
The book includes links to the best free software and web resources when it comes to malware protection and prevention. A great book to have from beginners to advanced users.
Michael Kelley
Michael Kelley es el director de Discipulado en Lifeway Christian Resources y el autor de Aburrido: Encontrando a un Dios extraordinario en una vida ordinaria. Entre algunos de sus trabajos previos se incluye Vocabulario Santo, Los fuertes refranes de Jesús y Los miércoles eran bastante normales. Posee una Maestría en Divinidad de la Escuela de Divinidad Beeson en Birmingham, Alabama. Michael y su esposa tienen tres hijos y viven en Nashville, Tennessee. Michael Kelley is director of Discipleship at LifeWay Christian Resources and author of Boring: Finding an Extraordinary God in an Ordinary Life. His previous works include Holy Vocabulary, The Tough Sayings of Jesus, and Wednesdays Were Pretty Normal. He holds a Master of Divinity degree from Beeson Divinity School in Birmingham, Alabama. Michael and his wife have three children and live in Nashville, Tennessee.
Read more from Michael Kelley
Transformational Discipleship: How People Really Grow Rating: 4 out of 5 stars4/5Wednesdays were Pretty Normal: (Enhanced Edition) Rating: 5 out of 5 stars5/5The Whole Story for the Whole Family: A Year of Jesus-Centered Family Devotions Rating: 5 out of 5 stars5/5Tent City: A Mississippi Story Rating: 0 out of 5 stars0 ratingsFred and June: Journeys Rating: 0 out of 5 stars0 ratingsThe Fountain Rating: 0 out of 5 stars0 ratingsJuno's Song Rating: 0 out of 5 stars0 ratings
Related to Practical Malware Prevention
Related ebooks
Compsec: For the Home User Rating: 0 out of 5 stars0 ratingsCommon Windows, Linux and Web Server Systems Hacking Techniques Rating: 0 out of 5 stars0 ratingsMastering Kali Linux for Advanced Penetration Testing - Second Edition Rating: 4 out of 5 stars4/5CompTIA Security +: Malware and Malware Infections Rating: 0 out of 5 stars0 ratingsHacking: Computer Hacking for beginners, how to hack, and understanding computer security! Rating: 5 out of 5 stars5/5Hacking: 10 Easy Beginners Tutorials on How to Hack Plus Basic Security Tips Rating: 0 out of 5 stars0 ratingsKali Linux Cookbook Rating: 4 out of 5 stars4/5Cyber Combat: Learn to Defend Against Cyber Attacks and Corporate Spying Rating: 0 out of 5 stars0 ratingsPenetration Testing Bootcamp Rating: 5 out of 5 stars5/5Building Virtual Pentesting Labs for Advanced Penetration Testing Rating: 0 out of 5 stars0 ratingsBreaking Computer Network with Internet Rating: 0 out of 5 stars0 ratingsLearn Kali Linux 2019: Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Rating: 0 out of 5 stars0 ratingsOnline Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsKali Linux Intrusion and Exploitation Cookbook Rating: 5 out of 5 stars5/5BackTrack: Testing Wireless Network Security Rating: 0 out of 5 stars0 ratingsMicrosoft Windows Server Administration Essentials Rating: 0 out of 5 stars0 ratingsIT Security Concepts: 1, #1 Rating: 5 out of 5 stars5/5Hacking Android Rating: 5 out of 5 stars5/5A Big Security Fix and Performance Manual: The Essential Guide to Computer Security & Performance Rating: 0 out of 5 stars0 ratingsEthical Hacking and Computer Securities For Beginners Rating: 4 out of 5 stars4/5Instant Netcat Starter Rating: 4 out of 5 stars4/5Ethical Hacking 101 Rating: 4 out of 5 stars4/5How to Investigate Like a Rockstar: Hacking the Planet Rating: 0 out of 5 stars0 ratingsCuckoo Malware Analysis Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsNetwork Attacks and Exploitation: A Framework Rating: 4 out of 5 stars4/5Protect Your Personal Information Rating: 0 out of 5 stars0 ratings
Security For You
Cybersecurity For Dummies Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5What is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5The Art of Deception: Controlling the Human Element of Security Rating: 3 out of 5 stars3/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5EU GDPR – An international guide to compliance Rating: 0 out of 5 stars0 ratingsUnmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5CISM Certified Information Security Manager Study Guide Rating: 4 out of 5 stars4/5How Not To Use Your Smartphone Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsEthical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5
Reviews for Practical Malware Prevention
0 ratings0 reviews
Book preview
Practical Malware Prevention - Michael Kelley
Copyright © 2015 Michael L. Kelley Jr. All rights reserved.
Printed in the United States of America.
For my daughter, Harper. I love you.
I miss you, but the memories are easy to find. I love you Gram.
Contents
Preface: 8
Chapter 1: Virus, Worm, Trojan 10
Chapter 2: Back It On Up 22
Chapter 3: Autoruns 28
Chapter 4: Temporary File Cleansing 35
Chapter 5: Malware Really Bites! 40
Chapter 6: Rootkits 45
Chapter 7: Web Browsers 48
Chapter 8: Defragging 52
Chapter 9: Updates 56
Chapter 10: Software Routine 60
Chapter 11: Service Config 65
Chapter 12: File Extensions 68
Chapter 13: Keyboard Shortcuts 76
Chapter 14: Command Line 90
Chapter 15: Port List 94
Chapter 16: Passwords 98
Chapter 17: Software/Links 103
Chapter 18: Afterward 121
About the Author
Michael Kelley Jr. lives in Southwestern Pennsylvania with his fiancé and their 1 year old daughter. Michael is a graduate of California University of Pennsylvania and holds degrees in computer science and criminal justice. He works as a computer technician for one of the largest public school districts in the county. He is in contact with many various computer systems on a daily basis. Thanks to his parents, he got into computers when he was in 10th grade and hasn’t looked back since. Starting with basic technical support, he moved into programming and has even developed smartphone applications. His interests include: computer security, game programming, passwords, computer forensics, thrift shopping, and photography. He writes on his blog at: http://abitofabyte.blogspot.com/. He can be contacted directly via email at: [email protected].
Preface
Do you feel like your computer used to be way faster? Wonder why it is so bogged down? Tired of waiting five minutes just for a program to open? This book is intended to be a learning guide into the world of malware prevention. Using this book, readers will be able to identify various threats that slow down a computer system. Using free tools, readers will be able to find such threats and eliminate them from their systems.
Once completed, readers will also learn techniques to speed up the Windows operating system. No more waiting forever for a computer to fully boot. No more ads or pop-ups. No more lengthy virus scans where after, the problem returns.
Included at the end of this book will be valuable resources and a list of all the software tools used. You can download the software (Chapter 17) prior to reading through the book to be able to follow along.
I hope you enjoy reading this and can take away a few key lessons from it.
~Michael
Computers don’t understand body language so you have to deal with them in a different way than you do with people.
Professor Donald Knuth, 1981
Chapter 1: Virus, Worm, Trojan, Oh My!
Ever wonder why your computer felt faster than it does now? Tired of paying someone high fees to fix your computer only for the problem to come back? Wish you knew more about what was going on inside of that mysterious computer case? Want free ways to instantly speed your computer up? Well look no further! This chapter is going to be a quick introduction on why your computer tends to slow down over time.
I remember getting our first powerful computer at home when I was in 10th grade. It was a Dell desktop system that my dad special ordered. I was addicted. I spent many restless nights on our dial-up connection getting acquainted with Windows. It was tons