F5F Stay Refreshed Software Operating Systems Virus

Virus

Virus

Pages (3): Previous 1 2 3 Next
M
ManTheMonkey
Member
222
03-09-2016, 11:13 PM
#11
Your PC seems to be powered off, but the scan results show it's being checked. It's fine if it's off—just make sure the cable is properly connected before plugging it back in.
M
ManTheMonkey
03-09-2016, 11:13 PM #11

Your PC seems to be powered off, but the scan results show it's being checked. It's fine if it's off—just make sure the cable is properly connected before plugging it back in.

F
FureaMC
Senior Member
564
03-10-2016, 07:51 AM
#12
To restart and eliminate the virus, disconnect the cable. This stops remote access because your device is no longer connected to the Internet.
F
FureaMC
03-10-2016, 07:51 AM #12

To restart and eliminate the virus, disconnect the cable. This stops remote access because your device is no longer connected to the Internet.

C
Crystal_Spark
Member
139
03-10-2016, 03:55 PM
#13
They had full authority I couldn't interfere with, but luckily I located the program in Task Manager they used. I just flooded the end task so they couldn't proceed until I set up my antivirus. It seems it wasn't automated because when I searched for Avast the browser closed and an alert blocked me with STOP.
C
Crystal_Spark
03-10-2016, 03:55 PM #13

They had full authority I couldn't interfere with, but luckily I located the program in Task Manager they used. I just flooded the end task so they couldn't proceed until I set up my antivirus. It seems it wasn't automated because when I searched for Avast the browser closed and an alert blocked me with STOP.

B
baris070x
Junior Member
49
03-17-2016, 10:59 PM
#14
Using your phone number and email isn’t completely secure. Social engineering tactics have repeatedly demonstrated how easily people can steal your contact info by deceiving customer service representatives and moving the details to another device without your awareness. This has occurred with Linus on their Twitter and YouTube accounts in the past.
B
baris070x
03-17-2016, 10:59 PM #14

Using your phone number and email isn’t completely secure. Social engineering tactics have repeatedly demonstrated how easily people can steal your contact info by deceiving customer service representatives and moving the details to another device without your awareness. This has occurred with Linus on their Twitter and YouTube accounts in the past.

V
vdlogt254
Member
74
03-25-2016, 11:55 PM
#15
This approach lets me test games without spending money. Using a debit card keeps the balance at zero, so they can't access it for anything. They seem to treat each card as unique, preventing any negative impact. I contacted my bank to reassure them it's safe, as long as the amount stays at zero. For online purchases, I quickly pay and get back to zero, avoiding any lingering funds. The only real benefit is maintaining control over my spending. I’m considering backing up my SSD data, since I have both an SSD and an HDD.
V
vdlogt254
03-25-2016, 11:55 PM #15

This approach lets me test games without spending money. Using a debit card keeps the balance at zero, so they can't access it for anything. They seem to treat each card as unique, preventing any negative impact. I contacted my bank to reassure them it's safe, as long as the amount stays at zero. For online purchases, I quickly pay and get back to zero, avoiding any lingering funds. The only real benefit is maintaining control over my spending. I’m considering backing up my SSD data, since I have both an SSD and an HDD.

Z
Zen_Browncoat
Junior Member
8
03-26-2016, 07:34 AM
#16
To use the antivirus software, simply install it on your device and follow the on-screen instructions to scan and protect your system.
Z
Zen_Browncoat
03-26-2016, 07:34 AM #16

To use the antivirus software, simply install it on your device and follow the on-screen instructions to scan and protect your system.

Z
Zjide
Junior Member
13
03-26-2016, 11:26 AM
#17
You already received the file. No internet access needed.
Z
Zjide
03-26-2016, 11:26 AM #17

You already received the file. No internet access needed.

J
JOSHTYLER
Junior Member
26
03-26-2016, 03:40 PM
#18
These details remain valuable for identity theft and social manipulation. Many older companies still rely on phrases like "confirm credit card digits" or "verify your address" to grant access. For instance, contacting a mobile provider to move numbers, reaching out to a bank to approve payments, or speaking with an ISP to change service plans. While some tactics may seem ineffective, they remain tools for gaining leverage—often through harassment, data theft, or service changes. Some individuals might even use stolen debit cards as proof of identity for services like Azure or AWS, then exploit those accounts for illicit purposes. Once suspended, authorities could pressure you to explain your actions. It’s risky, but unfortunately, such methods are frequently employed.
J
JOSHTYLER
03-26-2016, 03:40 PM #18

These details remain valuable for identity theft and social manipulation. Many older companies still rely on phrases like "confirm credit card digits" or "verify your address" to grant access. For instance, contacting a mobile provider to move numbers, reaching out to a bank to approve payments, or speaking with an ISP to change service plans. While some tactics may seem ineffective, they remain tools for gaining leverage—often through harassment, data theft, or service changes. Some individuals might even use stolen debit cards as proof of identity for services like Azure or AWS, then exploit those accounts for illicit purposes. Once suspended, authorities could pressure you to explain your actions. It’s risky, but unfortunately, such methods are frequently employed.

S
Scienceelf1
Junior Member
4
03-27-2016, 07:05 PM
#19
You need to prepare your SSD for formatting. This usually involves backing up data, creating a bootable drive, and following the appropriate steps in your operating system.
S
Scienceelf1
03-27-2016, 07:05 PM #19

You need to prepare your SSD for formatting. This usually involves backing up data, creating a bootable drive, and following the appropriate steps in your operating system.

R
Ranger6800
Member
241
03-27-2016, 10:59 PM
#20
Restart Windows and notify your bank about a possible Debit card theft. Confirm you bought Avast and just want them informed in case of concern. Obtain a fresh debit card and deactivate the old one. Access all accounts using a secure device, update passwords, recovery questions, and enable 2FA everywhere. Monitor account activity closely for any unusual logins or actions. Maintain your OS updates, run antivirus on your computer and mobile devices, and consider using Emsisoft as a strong protection tool. Install a reputable password manager such as Dashlane or similar services with dark web tracking to alert you about compromised credentials. If funds are available, a recent Asus Router with AiProtection+ offers added home network security. This technology could have detected the connection and blocked it, scanning files for threats. A layered security approach is essential today.
R
Ranger6800
03-27-2016, 10:59 PM #20

Restart Windows and notify your bank about a possible Debit card theft. Confirm you bought Avast and just want them informed in case of concern. Obtain a fresh debit card and deactivate the old one. Access all accounts using a secure device, update passwords, recovery questions, and enable 2FA everywhere. Monitor account activity closely for any unusual logins or actions. Maintain your OS updates, run antivirus on your computer and mobile devices, and consider using Emsisoft as a strong protection tool. Install a reputable password manager such as Dashlane or similar services with dark web tracking to alert you about compromised credentials. If funds are available, a recent Asus Router with AiProtection+ offers added home network security. This technology could have detected the connection and blocked it, scanning files for threats. A layered security approach is essential today.

Pages (3): Previous 1 2 3 Next