Hello, I'm KoolKid, former moderator of the website GamerzHavoc, former administrator at HackPulse, and an active member (and former moderator) on GamerzPlanet. I made this post a few years back because a lot of "fake hacks" were being posted. I remember that the reason I made this post was that someone posted a *.bat file that shutdowns the computer. Well, here I am, over 2 years later and also over 2 years wiser, re-editing this post. Hopefully, this can save a lot of your computers, accounts, and anything else you have on your computer :music:The first "Computer Safety" thread was posted in the WolfTeam forum because that's where the program was. Over 9000 post views for this thread, not bad. Enjoy and stay safe! ____________________________________________________________________________________________________ Warning Signs of a Fake (and possibly infected) Hack: The Join Date: The join date should be the very first red flag. If the user joined within the day of the post or within the week or so, you should be VERY careful. I'm not saying that ALL new members are evil malicious virus posters and you shouldn't download their files, I'm just saying that you should watch out. Read other people's comments and scan the file(s) before running/extracting anything. Yes, I understand that this is basic knowledge but regardless, some people just think about the hacks and disregard the risks of running the program. Ultimately, this one slip-up could result in a keylogger, RAT, and may require a disk reformat and may also lead to a loss of a lot of money. Their Post Count: Most of the time, the post count is related to their risk factor. 1 post is very suspicious because that basically means that they have never posted anything before including other hacks, tutorials, or useful things that would show that the person has experience as a programmer/trustworthy person (although I think you need 10 posts to post a download). Same note as above, not all low posters are evil nubs. *.bat and *.cmd files: For these ones, you have to worry more about pranks than receiving a virus but when there is a will, there's a way (picture of a *.bat virus generator). As you can see in that picture, it can even delete your operating system! So basically, before you run the *.bat file, right click, edit (with notepad or wordpad), and then see what the text file says. If you see a bunch of "del" (short for delete) followed by things like system or windows or anything you don't want deleted, then delete the file and report the person. Also, if you see the shutdown command, I don't suggest running the file. ____________________________________________________________________________________________________ ____________________________________________________________________________________________________ Virus FAQ: Welcome to Viruses - Frequently Asked Questions Question One: Can you scan a file without downloading it? Answer: http://vscan.novirusthanks.org Question Two: When you download a RAR or ZIP file, can you get a virus? Answer: When you download it, you will not get the virus unless you open/run the program. Question Three: How do I know if there is a virus in it or not? Answer: What I would do is I would save it to the desktop and scan it with one of the virus scan websites below Question Four: Which viruses are so called "Safe"? Answer: Basically, what this question is asking is, which programs do you not have to worry about being a virus. Upload an injector into a virus scan website and see which detections come up. These are called "false positives". You do not have to worry much about these ones because they can do you no harm but this method is not always fool-proof so also follow your instincts. ____________________________________________________________________________________________________ Free Virus Scan Websites: Note: These are file scanners, not anti-virus programs. VirusTotal - Free Online Virus and Malware Scan (Recommended) Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org (Also Recommended) Online Virus Scan (Not particularly recommended) Online malware scan NOTE: WHEN A WINRAR/WINZIP FILE IS PASSWORD PROTECTED, THESE VIRUS SCANNERS CANNOT DETECT ANYTHING BECAUSE IT CANNOT ACCESS THE FILES! REMEMBER THIS BECAUSE THIS IS IMPORTANT!!! Even when the Virus Scan doesn't pick much up, it could still have a virus by using a FUD crypter (read dictionary below). ____________________________________________________________________________________________________ What is a False Positive? A false positive occurs when a virus scanner erroneously detects a 'virus' in a non-infected file. False positives result when the signature used to detect a particular virus is not unique to the virus - i.e. the same signature appears in legitimate, non-infected software. These detections often occur in packers and injectors. List of Absolutely 99.99% of the Time Viruses Ardamax (Associated with Ardamax Commercial Keylogger) Trojan.Dropper (TR/Dropper.Gen) - This is a type of virus, but this type is most of the time malicious Perfect Keylogger (Associated with Perfect Commercial Keylogger) Sality CyberGate (Associated with the CyberGate Remote Administration Tool) Dybalom (Usually associated with iStealer) Neshta Turkojan (Turkojan RAT) Bifrost Ramnit/Quolko ZBot List of Known False Positives Hupigon Eldorado WS.Reputation.1 Artemis Themida ASPack OnlineGame(s) ____________________________________________________________________________________________________ Malicious Programs - Dictionary: RAT: A RAT is a Remote Administration Tool. This program allows the controller to take control of the victim's computer and make it do whatever the controller wants. More Information - Wikipedia Keylogger: A keylogger is a program that records the victim's keystrokes and sends the information to an email or website via FTP. This is the most common type of personal grade viruses due to its accessibility. More Information - Wikipedia Malware: Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. More Information - Wikipedia Adware: Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. Spyware is included under the umbrella of adware and malware. More Information - Wikipedia FUD Crypter: Fully Undetected (FUD) crypter basically takes a detected virus and turns it into a undetected virus that either few or no anti-virus programs can pick it up. Sorry to tell you this but any file can have a virus and you can never be safe. (But apparently SandBoxie is a good place to start) Stealer: A stealer does what it sounds like it does. It steals your account information saved on your computer. Cookies. If you pressed "save password for Gamerzplanet", then a stealer will take that information and send it to the person who created the virus. ____________________________________________________________________________________________________ Credits: I, GoldenEagles, made this guide and if I either saved your computer or you believe that this guide was well-written, then please give me +rep by pressing the button, pressing I approve, and leaving me a comment. I worked hard on this guide so please help me out and help me get more than 18 rep power and 966 rep points.