TotalSystemSecurity.com

Find the Best solution for PC threats

Category: How To

Top 5 Chrome Extension to help maintain privacy and security while browsing

We often come across various browser extensions which can enhance our browsing and help us to stay protected while surfing. But sometimes, we just stumble upon onto any annoying rather than helpful extensions, which are nowhere helped us and instead stay their on our browser to annoy us.

google-chrome-tutorial

Extensions are helpful no doubt, but many cyber offenders release fake versions of legitimate extensions to fool users and only are meant to serve their evil purposes.

Note:

  • You should never download/install any extension from untrusted links as it could be form of any Adware/Malware.
  • Always visit the Chrome store to download the needed one.
  • Also, their are various built-in functionalities present within the browser, which can help you stay protected online without the use of any extensions.

Now, here is the quick list of some extension that could be helpful to you.

>>>>Block Sites: The web is full on contents that appears in various forms like redirects pages that opens one after another. We need to be focused while working at that time, some websites distracts you and never let you do your work peacefully. Also, some of them could be harmful ones which might contain crypto-mining, ads and pop-ups to make you install any potentially unwanted program. Block Site will help you easily block the annoying and harmful websites on your chrome browser.block sites chrome extension
Click to Read More about Block Site Extension.

 

>>>>No coin: There are various websites which uses crypto-mining scripts to mine for digital currency like Bitcoin or Monero. This can consume all your CPU resources and you will notice your CPU usage more than 90%. This clearly means your resources are being negotiated without your permission. No coin simply blocks such website one is like coinhive. This is a must have extension to stay protected against Cryptojacking.

no coin chrome extension

Click here to Read More about No coin Extension.

 

>>>>Click&Clean: This is all in one chrome extension having various functionalities that deletes typed URLs, Cache, Cookies, download and browsing history to prevent you from being tracked by third-party sites, Not only that, it even scans for malware that might have hidden on your computer system. All-in-all, it will keep your browser safe and up-to date.click-and-clean chrome extension

Click Here to Read More about Click&Clean Extension.

 

>>>>Web of Trust(WOT): It is crowd-sourced extension that marks a website safety level as safe, suspicious or unsafe. It has a huge community of users, where they can put their reviews on websites that will help you to know the website you are visiting is a trustworthy one or not. It will alert you whenever you are visiting any harmful website.web of trust chrome extension

Click Here to Read More about Web of Trust(WOT) extension.

 

>>>>HTTPS Everywhere: This extension switches the website URL from HTTP to HTTPS, that means your data will be encrypted and secured. This extension is a joint work of Tor Project and the Electronic Frontier Foundation so can feel safe of any kind of online threats. HTTPS everywhere Chrome extension

Click Here to Read More about HTTPS Everywhere Extension.

 

Recommended Read:

How to Use Chrome’s Built in Malware Scanner to Find and Remove Unwanted Software Programs

How to Use Chrome’s Built in Malware Scanner to Find and Remove Unwanted Software Programs

We are fully dependent on your gadgets like Phone, PC, Tablets, Computers at home or work to do various tasks whether it is personal or professional. Likewise, cyber hookers are also keen on exploring the ways to hack your computers, tamper your privacy and infect it badly to achieve its own evil motive.

How to Use Chrome’s Built in Malware Scanner

So, we should always stay step ahead and take the security of our devices seriously. Here, is a very important feature added to the Chrome browser for both Windows users to give a right away scan to their computer to check for any unwanted software program installed.
Google Chrome periodically runs this scan to find any potentially unwanted program hidden on the Window’s OS and keep it away from such things.

But you can quickly activate this feature to run a scan on your computer through Chrome enabled feature and detect any malicious program right away.
This feature is called “Clean up computer” which can help you find suspicious or unwanted programs on your computer. If the scan detects any such program/application like unwanted extensions, malware or Adware, then it will prompt you to click on Remove.
Chrome will quickly remove the harmful software, turn off any suspicious extension and restore your previous settings.
Here is the quick step to access this feature and run scan manually:

Clean up computer

  1. Open your Google Chrome browser.
  2. At the top right corner, click on the three dots and then click on “Settings”’.
  3. Go through the “settings” window to find “Advanced” option.
  4. After clicking on Advanced, you will see “Reset and clean up,” option.
  5. Now click on Clean up computer.clean up computer settings on chrome
  6. Click On Find.Chrome-Malware-Scanner

Chrome will start the scanning process and if it detects any suspicious program, then it will ask you to click on “Remove”.
For the next time, you can simply type the URL chrome://settings/cleanup in the address bar to quickly access the menu.

Reset your browser settings

  1. Open your Google Chrome browser.
  2. At the top right corner, click on the three dots and then click on “Settings”’.
  3. Go through the “settings” window to find “Advanced” option.
  4. After clicking on Advanced, you will see “Reset and clean up,” option
  5. Under “Reset and cleanup,” option click “Reset Settings”.

Hope this article was helpful to you. Stay updated, stay protected….

What is cryptojacking? How to prevent your browsers from in-browser Mining?

What is cryptojacking?

Cryptojacking is the terms being used to define for mining of crypto-currencies with the expense of someone else resources of the computer system. As cryptocurrency gaining popularity due to its non-centralized nature, it cannot be traced by the government. And are easily used by cyber criminals like Ransomware to make transactions digitally. Hacker also take advantage of this to make huge money. But as mining process needs lots of CPU and GPU resources, they do it make dropping malicious javaScript codes and fake extensions to the web browser that starts executing within the background momentarily.What is cryptojacking? How to prevent your browsers from in-browser Mining?While users are unaware of such happens on their browser, Cryptojackers mislead users by showing ads, stream videos, games and so on. Earlier it started with CoinHive and now there are lots of similar to this being discovered that are stealthily hijacking the browsers like Google Chrome, Mozilla Firefox to run the mining script on the browser that uses the CPU power of the attacked system to generate crypto-currency like Bitcoin and Monero.
Here we, list some of the in-browser Miner programs from your database that uses cryptojacking technique to mine cryptocurrency:

Image Previewer

Deloton.com

Auto Refresh Plus

Hanstrackr.com

Nowadays, various website owner also use crypto mining scripts while user visits their web site to earn extra profits and keep their sites running. The most popular to this was “The Pirate Bay” which is the world’s most popular torrent website confessed using Monero cryptocurrency miner on its websites.

How to detect cryptocurrency Miner program running on your system?

Earlier digital currency like Bitcoin was popular among the Ransomware authors to receive payment from its victims. As the cryptocurrency cannot be traced, but many hackers and people getting interested in cryptocurrency as these have high exchange rates and can help generate huge revenue.
So many websites and in-browser Miner extensions runs the mining JavaScript codes on the web browsers to mine crypto coins.

Users encountering high CPU usage when they visit a particular website. If you notice your browser become extreme slow, lots of commercials appearing on the web page and pop-ups appearing out of nowhere on your browser, can be sign of cryptojacking.
If you are not even a tech-savvy, you can just perform a quick check on your browser if unknown web extension installed, websites that are running bad scripts within the background and CPU consuming more than 70% of the resources and sites with massive amount of advertisements.

How to prevent your web browser from Cryptojacking?

Most of the websites running crypto-mining scripts uses the service from CoinHive that offers a JavaScript miner for the Monero coins. The code is embedded within the websites which user visits. While the user is busy in playing games, streaming videos or seeing advertisements, the miner auto-executes within the browser and generate Monero coins for the website owners. Website owners do this to keep their site running and earn extra income.
As the mining process requires huge CPU power so may not want your resources to be misused by hackers or any other websites.
Here are few quick things you can do stop crypto-mining on various browsers:

Use browser extensions to block the sites that uses javascript codes for in-browser mining:

For Chrome browser, you can use No Coin or MinerBlock Chrome extensions that are the free and most effective methods that can be used to block cryptocurrency mining within the Google Chrome browser. These extensions automatically blocks popular and most widely used mining domains, and don’t worry the extensions will be adding and more and more such domains with their usage.

For Firefox Browser, you can use NoScripts extension
This extension aggressively blocks almost all the scripts running on the websites. So you may not some part of the visited websites. You can use this extension to get rid of cryptocurrency mining.

You can also use Ad blocking extensions to block mining domains
Ad blocking extensions such as AdBlock can be useful to stop websites running mining script in web browser. Whichever browser you may be using, you can search for “Ad blocking” extensions and within the settings you can list the domain name or URL to completely block them. Even if you are not sure, you can have a hit and trial method on any suspicious website.

For Opera Browser, there is an in-built functionality that blocks CoinHive and its scripts in the latest Opera 50 web browser. Using this feature user can block the websites that make use of CoinHive scripts or other cryptocurrency mining techniques. You can find this option under:
Settings for windows/Preferences on macOS > Basic > Block ads and under the Recommended lists of ad filters.

How to Remove Cryptojacking Programs

If your Computer or Browser is already infected with Crypto-miner program, then you may notice the following symptoms:

  • User may locate unknown process within the task manager window which will have a description of “No File”.
  • The CPU usage will show 90% or above.
  • Applications will run slowly and minimize and maximize window will stuck at times.
  • User may face difficulties while browsing, playing games, watching videos and performing other tasks.
  • Normal performance of the computer will be hampered.

If you notice the above behaviors of your computer system, then you should quickly check of Crypto-Miner program by scanning your computer and remove them.
Our technical team have tested the threat and found that Crypto-Miner can be successfully removed by these anti-malware applications.

Remove Miner program with McAfee Anti Virus Security

Remove Miner program with Panda Antivirus Pro Security

Remove Miner program with STOPzilla AntiVirus 8.0

Remove Miner program with SpyHunter

Any of these automatic Removal methods works at their best to free your computer system from crypto-Miner. 


How to prevent opening malicious sites on Chrome Browser(2018 updated)

Most of the computer viruses attacks the system while users are surfing and they are randomly redirected to any unknown URL. Such redirected pages might contain harmful codes embedded within, which stealthily downloads malicious programs onto the computer.
Many users may not know that we can prevent malicious sites from opening on our browser and hence protect the PC or laptop from being attacked by any threat.

How to prevent opening malicious sites on Chrome Browser
By activating this feature on your Chrome browser, you will be alerted as “Deceptive Site Ahead” each time any suspicious site attempts to open on your browser or do any other actions on the page.

The alert by Deceptive site ahead states:

“Attackers on [site url] may trick you into doing something dangerous like installing software or revealing your personal information (for example, passwords, phone numbers, or credit cards)”.

Here is a quick and easy step to protect your browser and device from dangerous sites:

  • Start Google Chrome Browser.
  • Click on the three horizontal dots in the top-right corner. This will open the “Menu”.three-dotsgoogle
  • Navigate through the menu and Select “Settings”.settings on google chrome
  • In the bottom click on “Show advanced settings”.chrome advanced settings
  • Then, go to “Privacy and security” and turn on the toggle button next to “Protect you and your device from dangerous sites.deceptive site block

Users are strictly advised not to bypass this security alert, as it may invite any harmful program or malware onto your PC.
If still you want to visit the site, then follow the above steps again and turn off the toggle button.

Also Read: How to Stop Pop-Up Ads in Chrome Browser

A Complete List of “Windows System Run Commands”

This post contains the useful Run commands that works on Windows 7, Windows 8, and Windows 10. This will help users to quickly access various applications, system utilities and tools.

How to Open Windows Run Commands

How to open Run window
To any versions of Windows OS, you can open run command easily through the shortcut method that is pressing Windows key and alphabet “R” together, where “R” is not case sensitive. Open run command by going through Start menu.

run

Here is the useful list:

  • cmd:Opens the command prompt
  • cleanmgr: Disk Cleanup
  • compmgmt.msc:Opens the computer management console
  • calc: Opens Calculator
  • control: Opens the Control Panel
  • control printers: Opens the printers dialogue box
  • devmgmt.msc– Opens the Device Manager
  • dfrg.msc: Opens Windows’ disk defragmenter
  • diskmgmt.msc:Opens the disk management tool
  • dsa.msc: Opens Active Directory Users and Computers
  • dssite.msc: Opens Active Directory Sites and Services
  • dhcpmgmt.msc: Opens the DHCP Management
  • dnsmgmt.msc: Opens the DNS Management
  • excel: Opens the Microsoft Excel (if installed)
  • eventvwr/eventvwr.msc: Open the event Viewer window
  • fsmgmt.msc:Opens shared folders
  • frontpg: Opens the Microsoft FrontPage (if installed)
  • gpedit.msc:Opens the group policy editor
  • iexplore: Opens the Internet Explorer
  • lusrmgr.msc: Opens the local users and groups
  • msinfo32: Opens the System Information utility
  • mmc: Opens the Microsoft Management Console
  • msaccess: Opens the Microsoft Access (if installed)
  • msmsgs: Opens the Windows Messenger
  • mspaint: Opens the Microsoft Paint
  • mailto:Opens the default email client
  • msconfig:Opens the system configuration utility
  • ntbackup: Opens the Backup or restore Wizard (Windows Backup Utility)
  • notepad: Opens the Notepad
  • powerpnt: Opens the Microsoft PowerPoint (if installed)
  • perfmon.msc:Opens the performance monitor
  • regedit:Opens the registry editor
  • rsop.msc:Opens resultant set of policy
  • rstrui: Opens the System restore
  • services.msc: Opens the Services utility window
  • Secpol.msc:Opens local security settings
  • Services.msc:Opens services utility
  • Sysedit:Opens system configuration editor
  • System.ini:Opens the Windows loading information
  • winword: Opens the Microsoft Word (if installed)
  • wordpad: Opens the WordPad
  • wmplayer: Opens theWindows Media Player
  • Win.ini: Opens the Windows loading information
  • Winver: Shows current version of Windows

How to Block Pop-Ups in Firefox Browser

This article explains “How to Block Pop-Ups in Firefox Browser” both older and new versions of Firebox browsers.

block Firefox pop-ups

Web browsers gives us a platform to get connected with the web and access the vast knowledge from the internet. But do you know how safe you are while browsing? Do you know that the websites you are visiting are continuously tracking your activities? Well, this is true…they collect your data sometimes to provide better services, but there are also lots of third-party websites that misuse your information for monetizing traffic of their sites and present numerous advertisements and pop-ups all over the browser.

We had already explained our users “How to block pop-ups and ads in Chrome Browser”, now here is the helpful guide to explain users how they can block pop-ups from annoying sites and avoid their data to be tracked by third-party sites.

However, while doing so, you may not able see some contents within the webpage but you can always put them in exceptions if you want them to appear on your browser.

Follow the steps to block pop-ups from your Firefox browser:

For older versions of Firefox browser:

  1. Click on the “Firefox” button in the upper-left corner of the browser.firefox menu
  2. Go to “Options” it will open a sub menu and you need to choose the “Options” once again.
    FirefoxButtonOptionsA window will open as shown in the picture:
  3. Select the “Content” tab and click on the check box that says “Block pop-up windows”. If it is already checked.firefox-popups
  4. Now click on the “Exception” button and remove all the existing exceptions. (Later on you can add sites to the exception if you want).FirefoxPopupAllowedSites
  5. Now Close the browser completely. And restart it.
  6. Click the “Firefox” button on the top-left and click on “Add-ons“.
  7. Search pop-up and ad blocking add-ons like: “Adblock Plus”.  It is better to be prevented from annoying pop-ups and ads on the browser. Now click on “Add to Firefox.”
  8. Make sure you always have the updated versions of the browser. And do not update them from any redirect page.

For New versions of Firefox browser:

  1. Click on the three horizontal bars on the top-right corner of your browser.open firefox menu
  2. Click on “Options” from the menu.
  3. Now you can navigate to “Privacy & Security” menu appearing on left of the window or just type “pop-ups” in the search bar. (as shown in the picture).firefox block pop-ups
  4. Now check the “Block pop-up windows“, if not.
  5. Now click on the “Exception” and remove all the sites from there and click on “Save Changes“.firefox allow exceptions
  6. Now restart your browser.

If you still see any annoying pop-ups that appears on your browser, then install an pop-up blocker add-on to your browser. But do not attempt this step from any third-party website.

How To install add-ons on the Firefox browser

  1. Click on the three horizontal bars on the top-right corner of your browser.
  2. Click on “Add-ons” from the menu.
  3. Now click on “Get Add-ons” from the left menu. firefox get addons
  4. Click on “See more add-ons” button.
  5. Search for “pop-up blockers” or just go to https://addons.mozilla.org/en-US/firefox/addon/strict-pop-up-blocker/.firefox pop-up blocker addon
  6. Now click on “Add to firefoxstrict pop-up blocker to block pop-ups from firefox browser

Recommended Step:

Continuous pop-ups could be a sign of virus infection, it is very important to make your computer/laptop virus free.

Click to scan your computer for any virus or harmful program(recommended).

How to Stop Pop-Up Ads in Chrome Browser

A simple guide to get rid of pop-ups from Chrome browser

How to stop pop-up ads on chrome browser

Pop-ups and unwanted Ads are too much annoying, as they never let you surf freely. They pop-up in the middle of nowhere and distract you from your activity. Apart from being annoying and disturbing, these pop-ups and ads can be risky as they might drop any harmful program or virus, if accidentally got clicked.

But don’t worry “there is always a solution for a problem”-we just need to find the right one for us.

So, here is the step-by-step guide how you can easily stop annoying pop-ups appearing on your Chrome browser.

  1. Open your Google Chrome browser.
  2. Click on the three dots appearing on the top-right corner of the browser. Now navigate to settings.chrome settings
  3. A new window will open, you can simply type the URL “chrome://settings/content?search=content+settings” on the “search settings” box appearing on top.
    Now click on the “Content Settings”(Control what information websites can use and what content they can show you).content settings
  4. Navigate through the menu and click on “PopUp”.popup menu chrome
  5. You can block/allow pop-ups by using the toggle switch. Turn off the toggle switch if it says “Allowed”.pop-up blocked on chrome
  6. You can also manage sites you do not want to appear on the browser(edit,block,remove).block and allow sites on chrome
  7. Now, go back to “Content settings” and choose “Ads”.block ads on chrome settings
  8. Turn the toggle off if it says “Allowed” (Blocked is recommended).ads block on chrome
  9. Now clear browsing history data.clear browsing datacleardata
  10. Close the window and scan your computer for any virus or harmful program(recommended).
  11. Now restart your browser.

How to Recover Deleted data from Pen Drive(Both using cmd and Recovery Software)

Pen drives are our small backup device that often help us to carry, store, transfer and access our important documents, photos, videos and any other files. But what will happen, if the data got accidently deleted or corrupted or infected by virus?
It comes as a shock to us….But now you don’t have to worry, because here we are going to teach you how you can get back your deleted files from pen drives. The recovery methods provided here works in cases of data deletion, lost, inaccessible due to any error or virus infection.

What you first need to do is, connect your Pen drive to the computer/laptop. In case the pen drive is corrupted or computer is not able to access it-”it will prompt you to format the Pen drive” or other similar warnings.

Once you connect the device, we recommend you to first scan it with Anti-virus program. Because if it infected, then it can further spread the infection to your computer/laptop.
If you don’t have any active anti-virus program, then click here to download and scan the Pen drive.

Manual Method:Pen Drive Data Recovery Using CMD

After scanning your pen drive, follow the below steps to recover deleted files using CMD. This method works when the pen drive is corrupted.

  1. Connect the Pen drive to the PC which you want to recover.
  2. Now click on the Start button on the bottom-left corner of the desktop screen and then right click.
  3. Click Command Prompt (Admin) in windows of earlier version for win 10 and above you will see “windows Powershell(Admin)”. Then the “CMD” will open.
  4. Type the drive in which the pen drive is connected like letter, E.g. > F: , and press Enter.
  5. Type attrib -h -r -s /s /d *.*, press Enter. Do not quickly close the window or do any other thing, just wait for few seconds.
  6. Now, check the pen drive see whether the files have been restored.

If this manual solution has not helped you to recover the files, then we have the automatic recovery solution for you. This will help you to recover any of your files like documents, photos, videos and any other.

Automatic Solution: Recover data from Pen Drive using “Card Data Recovery” software

Card Data Recovery software is a complete suite in one to recover your lost/corrupted/infected data from the pen drive. It works on all the versions of all windows OS.

      1. Plug the Pen Drive into your computer using a USB cable;
      2. Download Card Data Recovery and install it on your computer. And launch this pen drive data recovery software.

        Free Download Card Data Recovery

      3. Click “Start” on the home interface.connect-your-Pen Drive
      4. Select your Pen Drive; Select Standard Mode and then tick file types, or select Advanced Mode and then tick file formats. Click “Scan”.Select Standard Mode
      5. Select the files you need to recover and click “Recover“. Save the recovered files on your computer, instead of pen drive. Before recovery, you are allowed to preview photos and audios in advance.recover-data-from-card

Following these steps will help you recover your files from any corrupted or infected Pen Drive.

Welcome To TotalSystemSecurity.com, we will provide users with latest news and information about computer threats like Adware, Spyware, Trojan, Browser Hijacker and Ransomeware. Here at TotalSystemSecurity.com, you will get all minute information about latest threats and manual removal instructions. We Hope our guides and articles help you troubleshoot your PC issues.

TotalSystemSecurity © 2015-2018