In our online lives, nothing sends a shiver quite as quickly as a bluescreen, going down via bad hard-drives, corrupt installs or withering hardware is one thing, going blue via a virus is another story entirely, data is more often than not lost forever.
Former US Federal Computer Crime Prosecutor Hemanshu Nigam says that throughout 2011 viruses and malware were the most common types of cyber-crime. In 2011, 54 percent of online adults experienced a virus or malware attack ::::
Many of the most potent viruses last year were transmitted via links to corrupted sites or email attachments, often hitting as a disguised news story.
- We’re used to getting emails about packages being delivered. This year, hackers exploited that comfort and sent out emails impersonating DHL that launched a virus into the user’s computer.
- A popular “news” scam was a report about Fidel Castro’s death that launched a virus.
- A faked video of the death of Osama bin Laden was another virus circulated this year.
- Lady Gaga’s Twitter account was hacked and attackers sent out a link to a site where users could get a free iPad 2. Users were directed to a corrupted website.
From government agencies to electronics giants, hackers and attackers fought their way into personal information systems and websites, often just to show it could be done, but more often nefariously stealing valuable personal information.
Here are a few of the most audacious hacks from 2011:
- Email addresses, personal information of millions of people was stolen from the marketing firm Epsilon. Many experts saw it as the largest breach of its kind ever.
- Attackers found their way into Sony’s PlayStation customer database this year stealing information from millions of gamers.
- Lulzsec, a hacker group, claimed responsibility for an attack on the website for the Central Intelligence Agency. The hackers shut down the site for a portion of the day proving that the site was not as secure as once thought.
- “Anonymous” showed its support to Wikileaks founder Julian Assange by cyber attacking anyone who opposed his mission. Just this week, Anonymous even tried on the Robin Hood act by using stolen credit cards to donate money to charities.
Attempting to impersonate companies or people to rob others is nothing new. But during 2011 attackers were more bold and savvy with emails impersonating seemingly trustworthy sources. Most of the emails contained requests for personal information and a link to an external site that stole your information.
- Even the American standard for business excellence, the Better Business Bureau, was caught in a scam when hackers impersonated the BBB in emails containing viruses.
- Emails from “Facebook” went out asking users to click a link and input login information. The webpage to which the link directed the user was corrupted and infected the user’s computer.
- Not even the Federal Government was immune from this impersonation as the IRS found out earlier this year.
- The online payment gateway giant, PayPal, was impersonated in an email by hackers in an attempt to steal users’ banking information.
GET PREPARED! :: INSTALLING BITDEFENDER
- Install Bitdefender
- Create A Bootable Bitdefender Rescue Disk
- Run A FULL Scan
NOTE: Bitdefenders welcome screen provides an option to copy the installation package from the installation disc to a USB storage device. This is useful if you need to install Bitdefender on a netbook that doesn’t have a disc drive.
Insert the storage device into the USB drive and then click Copy to USB. Afterwards, go to the computer without a disc drive, insert the storage device into the USB drive and double-click runsetup.exe from the folder where you have saved the installation package.
If the welcome screen does not appear, go to the disc’s root directory and double-click the file autorun.exe.
- To install Bitdefender using the web installer downloaded on your computer, locate the file and double-click it. This will initiate the download of the installation files, which may take a while, depending on your Internet connection.
Bitdefender will first check your system to validate the installation.
If your system does not meet the minimum requirements for installing Bitdefender, you will be informed of the areas that need improvement before you can proceed.
If an incompatible antivirus program or an older version of Bitdefender is detected, you will be prompted to remove it from your system. Please follow the directions to remove the software from your system, thus avoiding problems occurring later on.
- To install Bitdefender from the installation disc, insert the disc in the optical drive. A welcome screen should be displayed in a few moments. Follow the instructions to start installation.
NOTE: You may need to reboot your computer to complete the removal of detected antivirus programs.
Follow The Setup Wizard Steps to Install Bitdefender Total Security 2012.
Step 1 – Welcome
Read the License Agreement and select Agree & Continue. The License Agreement contains the terms and conditions under which you may use Bitdefender Total Security 2012.
Note: If you do not agree to these terms, close the window. The installation process will be abandoned and you will exit setup.
Step 2 – Register Your Product
To complete the registration of your product you need to enter a license key and create a MyBitdefender account. An active Internet connection is required.
Proceed according to your situation:
- You purchased the product
In this case, register the product by following these steps:
1. Select I purchased the product and I want to register now.
2. Type the license key in the corresponding field.
NOTE: You can find your license key:
- on the CD/DVD label.
- on the product registration card.
- in the online purchase e-mail.
3. Type your e-mail address in the corresponding field.
IMPORTANT: A valid e-mail address is required. A confirmation message will be sent to the address you provided.
4. Click Register Now.
I want to evaluate Bitdefender
In this case, you can use the product for a 30 day period. To begin the trial period, select I want to evaluate this product.
To use the online features of the product, you need to create a MyBitdefender account. To create an account, type your e-mail address in the corresponding field. A confirmation message will be sent to the address you provided. If you already have an account, enter the e-mail address associated with it to register the product to that account.
Optionally, during this step you can customize the installation settings by clicking Custom Settings.
By default, Bitdefender Total Security 2012 will be installed in C:Program FilesBitdefenderBitdefender 2012. If you want to change the installation path, click Change and select the folder in which you would like Bitdefender to be installed.
Configure Proxy Settings
Bitdefender Total Security 2012 requires access to the Internet for product registration, downloading security and product updates, in-cloud detection components etc. If you use a proxy connection instead of a direct Internet connection, you must select this option and configure the proxy settings.
The settings can be imported from the default browser or you can enter them manually.
Enable P2P Update
You can share the product files and signatures with other Bitdefender users. This way, Bitdefender updates can be performed faster. If you don’t want to enable this feature, select the corresponding check box.
NOTE: No personal identifiable information will be shared if this feature is enabled.
If you want to minimize the impact of the network traffic on system performance during updates, use the update sharing option. Bitdefender uses ports 8880 – 8889 for peer-to-peer update.
Send Anonymous Usage Reports
By default, Anonymous Usage Reports are enabled. By enabling this option, reports containing information about how you use the product are sent to Bitdefender servers. This information is essential for improving the product and can help us offer you a better experience in the future. Please note that these reports will contain no confidential data, such as your name or IP address, and that they will not be used for commercial purposes.
Click OK to confirm your preferences.
Click Install to start the installation.
Step 3 – Installation Progress
Wait for the installation to complete. Detailed information about the progress is displayed.
Critical areas on your system are scanned for viruses, the latest versions of the application files are downloaded and installed, and the Bitdefender services are started. This step can take a couple of minutes.
Step 4 – Finish
A summary of the installation is displayed. If any active malware was detected and removed during the installation, a system reboot may be required.
If your computer is running Windows XP, the setup wizard will detect any networks you are connected to and will prompt you to classify them as Home/Office or Public.
Upgrading from an older version
If you are already using an older version of Bitdefender,please follow the below steps in order to upgrade to Bitdefender Total Security 2012: Remove the older version, then restart the computer and install the new version as described in the previous pages. Use this upgrade method if the other fails.
NOTE: Product settings and quarantine contents will not be imported from the older version.
HOW TO :: Bitdefender Rescue Disk
Download and Burn the Image to a Disc
The first thing you’ll need to do is check the BitDefender site and download the latest version of their rescue CD, then use an application to burn that ISO image file to an optical disc, our preference is ImgBurn, but there are a heap of apps to burn an ISO to disc.
Download and Create a Rescue USB
If you’d rather create a USB drive to boot from, you can download UNetbootin and use it to create the bootable flash drive—just select Diskimage and then browse to the location of the downloaded ISO file.
Select the drive that you want to write the image to, and follow the steps.
Using the BitDefender Rescue CD to Clean an Infected PC
Once you drop the disc in the drive and reboot, you’ll see a prompted menu that lets you choose the language you’d like to start with, or you can boot from the hard drive normally. We’ll obviously choose to start up the rescue CD.
Once you’ve started it up, if the resolution is too small, you can use the menu at the bottom to head to Settings –> Display to adjust it.
From here you can change the resolution to something bigger.
Once you’ve accepted the license agreement, the scan starts immediately.
If you need to do some work on your file system, you can easily use the File Manager to get to your files – the nice thing is that it opens up directly into your Windows drive.
There’s also a copy of TestDisk installed automatically, which can be used to recover data. If you’d like more information about how to use it, we’ve got a whole article about recovering data like a forensics expert.
It’s as simple as that. Enjoy your virus-free PC.
Operating Systems: Windows 7, Windows VISTA, Windows XP
Bitdefender antivirus software
Bitdefender internet security
Bitdefender free antivirus solutions
Bitdefender download antivirus solution
Bitdefender anti malware solutions