BlueCollarPC.US Launched June 14 2010 (since 2005 at .Net), a Personal Website for General Audiences with Computing Safety and Malware Removal Help and Information as main theme which includes memberships available for live help – at our Groups and Forums. Formerly Webmaster of BlueCollarPC.Net [closed] from 2005 -2009 (over 6 million Visitors) and back up BlueCollarPC.Org [closed]. ALL tolled, our sites are honored to offer free Community Help to just over 12 MILLION Users/Visitors since 2005 to present 2015.
VISIT OUR PERMANENT BACK-UP SITE HERE :
https://sites.google.com/site/pcsecurityhelper/ “PC SECURITY HELPER” (GOOGLE SITES)
VISIT/READ OUR BLOG HERE:
BlueCollarPC @ WordPress
For the record… Towards the end of 2009, the BlueCollarPC .Net /.Org(back up) created by me had enjoyed just over 6 Million Vistors/Users! – and are proud to have helped and indeed actually had “discovery” in the security industry concerning the malware RASautodial registry entries discovered by Yours Truly. Never be afraid to ‘take a look under the hood’ of your PC ! You never know what you’ll find. The move to BlueCollarPC.US reflects the move to complete malware removal help including the newer dreaded botnet infections and many others evolved. Our original domain began as an antispyware help detect/removal site.
Browsing the pages here you will find dedicated information, files, and links – as well as utilities softwares for detecting, blocking, and removing unwanted installations that are the threats beyond Anti-Virus and Firewall protections. These have now become generally known as the spyware catagory of threats to personal computers and online and personal safety.
“Malware” is the general term caught on that refers to all – both antivirus and antispyware catagory threats – including virus, worm, trojan, adware, spyware, rootkits, botnet infections, more.
There has now grown a wide community of help for removal of “badware” and “crimeware” (nics) from personal computers – very genuine and informed persons along with many professionals. The beginning is learning about the threats, their behaviors, and identifying any that may be present on your PC – and then of course clean removal. I hope all things here are very helpful to all interested, as I myself am involved in all and draw my complete experiences basically as an average consumer, and now ‘advanced user’ and finally endeavoring to Amateur Forensics and degreed with a Data Processor Certificate (1970 – older IBM 029 and Univac 026 Data Processor Machines and slight programming with the dinosaur Univac / Sperry Rand 9200/9300 Series w/ COBAL). We can’t all be programmers on today’s disk computer systems but we can learn to easily keep them clean
and healthy from the ills and dangers of malwares.
How And Where To Report Cyber Crime
REPORT CYBER CRIME
Internet Crime Complaint Center (IC3)
The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). IC3’s mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations. For law enforcement and regulatory agencies at the federal, state, local and international level, IC3 provides a central referral mechanism for complaints involving Internet related crimes. read more >> http://ic3.gov/
Federal Trade Commission (USA) Complaint Input Form
Federal Bureau of Investigation – Cyber Investigations – Cybercrime
Computer Crime & Intellectual Property Section
Our Cyber911 Help tipline is not intended to replace law enforcement emergency 911, 999 and other numbers worldwide. It is to help people know where to get help when they are being victimized online, and to provide help when help is needed. We work closely with law enforcement around the world, and require that when offline threats are involved that local law enforcement be notified before we can offer assistance to the victim or their local law enforcement…
Also, through our interactive forum you can get opinion of specialist attorneys and lawyers. Each lawyer in practice will give his opinion on matters, which are raised in the forum. You Can post queries view answers from experts and improve upon your knowledge base…
How to Report Cybercrime
WiredSafety’s Cyber911 Emergency tipline is not intended to replace law enforcement emergency 911, 999 and other numbers worldwide. It is to help people know where to get help when they are being victimized online, and to provide help when help is needed. We work closely with law enforcement around the world, and require that when offline threats are involved that local law enforcement be notified before we can offer assistance to the victim or their local law enforcement.
Take a Bite Out of Cyber Crime
Security product vendors
Links to developers and vendors of computer and network security products and services… SOURCE: http://www.virusbtn.com/resources/links/index?ven
AVG (formerly Grisoft)
Alwil Software (avast!)
BitDefender (formerly Softwin)
CA (Home user)
Central Command (Vexira)
Check Point (ZoneAlarm)
ClamAV (open source)
Frisk Software (F-PROT)
G DATA (AVK)
IBM ISS (Proventia)
Intego (Mac specialist)
McAfee, Inc. (formerly Network Associates)
MicroWorld Software (eScan)
Moon Secure (open source AV for Windows project)
New Technology Wave Inc. (VirusChaser)
Norman Data Defense Systems
PC Tools (Spyware Doctor)
Proland Software (Protector Plus)
ProtectMac (Mac specialist)
Quick Heal Technologies
SpyBot – Search & Destroy
Sunbelt Software (CounterSpy, Vipre)
Symantec Corporation (Norton)
Trend Micro Inc.
Webroot (Spy Sweeper)
eEye Digital Security (Blink)
WARNING – FAKE BOGUS SOFTWARES / Scareware…… INFECTION:
Title: The Spyware Warrior List of Rogue/Suspect Anti-Spyware Products & Web Sites
Description: Bad, False, Fake products
LavaSoft — The Rogue Gallery
The Rogue Gallery, powered by the Malware Labs at Lavasoft, is a resource dedicated to keeping computer users safe from rogue security software. By providing a comprehensive database of current rogue security applications, you have the ability to clearly see what programs are considered rogue – and avoid them.
Partial list of rogue security software
Security Notes / About: The highly innovative Windows XP was released in 2001. This began the “XP Years”. At that time, antivirus software was the only defense anyone ever heard of, used, – and based on the term “computer virus” and how damaging they could be to computers – we learned in launching a new Windows PC – the dangers. The “adware” was beginning and suddenly “spyware” was being discovered. Firewalls were unheard of in consumerism.