Quickly Scan Any File with 40 Different Antivirus Engines

VirusTotal-icoThere are several online services that will allow you to check files for viruses or malware by uploading the files from your computer. One reason you might use one of these services is that you have downloaded a new program and you want to know if it’s safe to install on your computer. One of the services that I use most often is called Virus Total’.

Virus Total is a free, independent service that will analyze uploaded files with around 40 different antivirus engines. Here is the current list:

AhnLab (V3)
Antiy Labs (Antiy-AVL)
Aladdin (eSafe)
ALWIL (Avast! Antivirus)
Authentium (Command Antivirus)
AVG Technologies (AVG)
Avira (AntiVir)
Cat Computer Services (Quick Heal)
ClamAV (ClamAV)
Comodo (Comodo)
CA Inc. (Vet)
Doctor Web, Ltd. (DrWeb)
Emsi Software GmbH (a-squared)
Eset Software (ESET NOD32)
Fortinet (Fortinet)
FRISK Software (F-Prot)
F-Secure (F-Secure)
G DATA Software (GData)
Hacksoft (The Hacker)
Hauri (ViRobot)
Ikarus Software (Ikarus)
INCA Internet (nProtect)
K7 Computing (K7AntiVirus)
Kaspersky Lab (AVP)
McAfee (VirusScan)
Microsoft (Malware Protection)
Norman (Norman Antivirus)
Panda Security (Panda Platinum)
PC Tools (PCTools)
Prevx (Prevx1)
Rising Antivirus (Rising)
Secure Computing (SecureWeb)
BitDefender GmbH (BitDefender)
Sophos (SAV)
Sunbelt Software (Antivirus)
Symantec (Norton Antivirus)
VirusBlokAda (VBA32)
Trend Micro (TrendMicro)
VirusBuster (VirusBuster)

They keep those engines up to date with the latest virus signatures, and they also offer detailed results from each engine in their reports. Virus Total is available in nearly two dozen languages.

To use this service, you simply visit the web page, click on the file upload button, select the file and wait for it to upload. Once the file is uploaded, you will often have to wait a few minutes for the scan results to appear. If you think that sounds pretty easy to do, you are correct. However, Virus Total now offers an even easier method, the Virus Total Uploader.

After you install the Virus Total Uploader [Windows Only] on your PC, you can right click on a file, then Send tothe Virus Total site.


After a few seconds, your web browser will open up to show you the results of the antivirus tests from Virus Total.

That’s not the only trick that the Uploader has for you. When you launch it from your Start menu, you’ll see three other upload options in it’s interface:


  • upload a file by choosing it’s process name
  • select a file by browsing to it’s location
  • type in the URL of a file on the web

Go to the Virus Total Uploader page to get it.

Techie Buzz Verdict:

Having a good antivirus program installed on your PC is a must have. The ability to double check files using 40 different antivirus engines is not required, but it sure is nice to have. If you’d like to try this application, I recommend it.


Techie Buzz Rating: 4/5 (Excellent)

Lock Your Programs with Lockup

lockup-icon [Windows Only] Do you manage or share user accounts on a PC? Are there certain programs that you don’t want someone to use? A tiny stand-alone freeware application named Lockup‘ will let you lock programs so they won’t run at all.

Lockup is very easy to use, but you should be very careful with it. If you make one wrong move, you can accidentally lock an entire user account so that it’s difficult to return to a usable state.

How to use Lockup:

Here’s a screenshot of one of the two modes of operation, Only the listmode.


In the screenshot above, you can see that I’ve added Internet Explorer to the list of executable files that will not run. To add more executables to the list, click the Browsebutton to select an EXE file, then click the little green check-mark icon at the bottom of the Lockup window. After you reboot or log off the PC and log back in, you’ll find that the EXEs you’ve listed will bring up a message telling you that the program is restricted.

Below, you can see a screenshot of Lockup in the All except the listmode.


This is a fairly risky mode since all executable files will be blocked from running, except those you add to the list. Make sure you don’t remove Lockup from the list or you may have a little trouble getting back access to it. I tried this mode briefly and it works great. All of my autorun (startup) applications failed to load when I logged in, even my antivirus application was blocked. This mode would be perfect for a PC that was used in a public place such as a library, school or cafe.

How does it work?

Occasionally, I run into a little program like this and I have to figure out what it’s doing. I learn lots of neat tricks this way. I suspected that Lockup was only making some changes to the Windows Registry and I was correct. I used an installation monitor to find out what changes it made in the second mode I showed you above.


As you can see in the image above, Lockup made changes to the Current_User policy to achieve the blocking it does. Anyone with the knowledge of these registry keys can do the same thing using the Windows Registry Editor (regedit.exe). Here’s a link to more information on the DisallowRun and RestrictRun registry keys.

Final Tips:

If you do get blocked from using programs or a specific program, you can still launch them using the Windows Run menu (Press Windows key + R) or from the command console (Press Windows key + R / type CMD’ without quotes / press Enter). For example, if I wanted to run Notepad, I could type notepad’ into the Run menu.

You can run Lockup from a USB flash drive if you want to make sure that nobody using the PC has access to the Lockup program. This could also be used for a practical joke if you are feeling mean (not recommended).

Also … here’s how to:

* Password Protect Programs and Files
* Lock and Hide Files and Folders
* Hide Your Secret Files in Zip Folders

Download: Home page for Lockup (requires .NET Framework 3.5)

Techie Buzz Verdict:

If you need to keep people from running specific applications on your PC, this little freeware app could be one of your favorite tools. It’s small, easy to use and it’s free.  The only thing missing from this application is a password protection feature.

Techie Buzz Rating: 4/5 (Excellent)

How to Find Out Who Is Spying On You

spying-on-you[Windows Only] Today, I found out that my computer at work had a trojan infection. Most of my co-workers would never have noticed the bug, but a little luck and the right tools made my discovery possible. Since I discovered the infection early, I was able to quickly  remove the malware. Do you know if evil computers are connecting to your PC? If you really want to find out, I recommend that you try two utilities from NirSoft.

Download and Install:
CurrPorts and IPNetInfo are both portable applications that are offered as ZIP files. You can unpack these ZIP files anywhere on your hard drive or even onto a flash drive to use them. CurrPorts and IPNetInfo work best if you put the files from both programs into the same folder. After I downloaded and unpacked them,   I ended up with the following files in my CPorts folder.


Run CurrPorts:
You can run CurrPorts by launching the cports.exe file. It will scan your computer and display a list of processes on your PC that are using the network and internet connections. The list contains the following columns of information on each connection.

Process Name *
Process ID
Local Port
Local Port Name
Local Address
Remote Port
Remote Port Name
Remote Address *
Remote Host Name
Process Path *
Product Name
File Description
File Version
Process Created On
User Name
Process Services
Process Attributes
Added On
Module Filename
Remote IP Country
Window Title

Search the information:
The most important columns to pay attention to are the columns described below.

Process Name is the name of the program or service on your PC that is making the connection.

Process Path tells you where the program or service is located on your hard drive. It’s important to know this location if you suspect that you have a spyware, virus or trojan infection.

Remote Address is a set of numbers that is often called the “IP Address”. This address is needed to identify the computers connected to you by the internet.

Many of the connections you’ll see won’t even have a remote address and you don’t have to pay as much attention to them. In order to unclutter the list and concentrate on the remote IP addresses, you can use the Options menu and uncheck the item labeled “Display Items without Remote Address“.


Identify WHO IS connecting:
Now that you have some IP addresses displayed, you can find out more about them by using NifSoft’s IPNetInfo utility. When you right click on any remote address shown in CurrPorts, you can find out more about it by choosing the IPNetInfo option. IPNetInfo will pop up and give you the WHOIS information if it’s able to.


Here’s an example of the WHOIS info for a Google page in Internet Explorer.


IPNetInfo.exe can be run all by itself by launching the ipnetinfo.exe file. When it’s running this way, you will have to paste in the IP Addresses manually to initiate WHOIS searches.

Stop the Spies:
Once you’ve identified all the owners of those remote IP addresses, you should have a better idea about who they are. You can usually find out more about them by using the company name in an internet search. If you are still suspicious that the IP addresses you are seeing are from the bad guys, you can check in several places to find out if they are on a watch list. I recommend that you search for malicious addresses at hpHosts. Just paste the remote IP address into the search box.

If you’ve identified a connection you don’t want, you can right click on entries in CurrPorts and either “Close” the connection or “Kill” the process on your PC. If you have a process running on your machine that continues to connect to IPs that are suspect, you should probably save an HTML report as shown below, then run an Anti-Virus and Anti-Spyware scan. I recommend using MalwareBytes or one of the other good free spyware removers. If that doesn’t do the trick, get some help from one of the Anti-Spyware forums. I always visit Temerc.com‘s forums when I need help.

If you wish to ask me about some of your remote connections, you can select one or more items in CurrPorts, click on “View” > “HTML Report – Selected Items”. When the report pops into your web browser, you can copy and paste the information into the comments below this article. You can also save the report from your browser using the File > Save menu.


Have a good day and surf safely!

New Free Virus Removal Tool from McAfee – Fake Alert Stinger

flying_wasp [Windows Only] McAfee is well known for it’s antivirus software, and you usually have to pay for their protection. They offer the free Stinger tool to help people clean out PCs that have been crippled by virus and trojan attacks.


There is no installation required. Just download it and run it. It works on all Windows PCs as far as I know.

I normally download a fresh copy of Stinger onto a USB flash drive or CD before I go off to help my friends with bug problems.

In addition to the standard Stinger, there’s a new version of Stinger out now called FakeAlert Stinger. It’s designed to specifically target multiple varieties of the FakeAlert trojans, such as, Kryptik, AVP Security, Fakespypro, Winwebsec, Antivirus Soft and XPSpy.

FakeAlert applications are a form of ScareWare that pop up fake warnings which attempt to trick you into running their scans and buying their premium products. It’s a huge money-making scam that’s been very effective against new PC users.

Download McAfee Stinger and FakeAlert Stinger

Notes: There are many other antivirus and anti-malware tools that can help you clean up an infected PC. Last year, Keith wrote about an application which will Remove Fake Antivirus from Your System. If all else fails and the PC is really trashed, I’ve got an article describing how to Run AntiVirus on a PC That Will Not Boot.

Techie Buzz Verdict:

techiebuzzrecommendedsoftware1 There are two versions of McAfee Stinger. Both are very good, and there’s no reason not to use both of them when you need to clean up an infected PC. I have used Stinger for years and I’ve never had an issue with it. I only wish it was Open Source, so that more people could contribute to it’s effectiveness.

Techie Buzz Rating: 4/5 (Excellent)

100,000 People Are Now Using Immunet Protect AntiVirus

Is 100,000 a big number by the standards of the Internet? No, it’s not. However, the people at Immunet might disagree. To them, this is very likely a much anticipated milestone.

My fellow author Tehseen first wrote about the Immunet Protect service in August of last year. At the time, only a few thousand people were using it. Immunet is a cloud (internet based) service that is constantly connected and stays up to date against the most recent bugs. Here’s what Immunet says about it:

Imagine for a moment that you could leverage the computers of your friends, family and a worldwide global community to harness their collective security. Every time someone in this collective community encounters a threat everyone else in the community gains protection from that same threat in real time.

I recently wrote about trying Immunet as an addition to your regular antivirus. Since then, I’ve started using it as my only active antivirus. I do occasionally run ESET’s online scanner.

This afternoon when I booted up my netbook, this is what I saw above my task tray.


Congratulations to the Immunet Protect team on crossing 100,000 users. You can tweet them at @immunet to offer your toasts to them as well.

Note: I only recommend this free AntiVirus service as an addition to your existing protection. That said, I don’t always take my own advice.

More information:  https://immunet.com/protect

Free Online Anti-Virus Scan from Trend Micro – the HouseCall

Here at Techie-Buzz, we keep our eyes open for free and easy to use online services. One of the most important things you need to manage is your computer’s security. If you surf the internet, it’s always possible that you’ve either gotten infected, or may suspect you’ve been infected by Malware, Trojans or Viruses.

housecall-icon Fortunately, there’s no shortage of security tools that you can install on your PC. There are also several online tools that you can use, and most of the online tools are free. Trend Micro, one of the most trusted providers of security software, also offers a free online anti-virus scanner, named HouseCall.

Don’t consider online scanners as any replacement for installing good anti-virus and anti-malware tools. The online scanners are there in case you need a second opinion.

It’s easy to use and you can see the steps involved below in a screen-show I’ve inserted.

If you can’t see the screen-show here, follow this link to view it.

Here are links to a few other online tools that you may like to take a look at:

Free Online Security Scan From Secunia

Scan Files Online In 24 Antivirus Engines From One Place

Review of ESET Online Scanner

Security Advice From McAfee That You May Not Want

Compress and Zip Files Online Without Any Software

Best Free Online Image Editors

Techie Buzz Verdict:

HouseCall is a good free anti-virus scanning service from a well respected source. I recommend it as a good source for a second opinion when you are afraid that your current security software is failing you.

Techie Buzz Rating: 3/5 (Good)

How to Lock and Resume Windows Sessions With a USB Stick

If your workplace conditions are too busy and you fear someone else might peek into your system when you are away, Predator will be useful. This program uses a simple USB stick to lock and resume Windows sessions.

You insert the USB drive and and run Predator when Windows starts. Whenever you want to lock your computer, just remove the USB stick. The Mouse and Keyboard are disabled and the screen goes black. You come back and plug in your USB to restore the display and work as usual.

You may think – why not lock computer using a password and hitting the Window key + L   shortcut?. There is no harm using Windows password to lock the computer, but there are some disadvantages. First, you have to type the password while resuming a Windows session. Second, if you do not change your password regularly, trespassers may notice and know about it.

With Predator, you don’t have to type anything. The USB drive becomes the only key to your computer.

How to Install Predator

Download Predator and unzip the package. Run the set up and install the program in the C drive ( Do not try to install in any removable drive, it won’t work).

You will be prompted to insert the USB drive and choose a password as shown below:


Click “Ok” and choose a password in the subsequent window as shown below


After that, choose the USB drive and hit “Create Key”. You are done wih the set up process.

When you start Windows and want to use your USB drive as a key, simply insert the USB drive and remove it after a couple of seconds. Windows will be locked and can be unlocked by using only your USB drive.

Security Features of Predator

Predator logs all the events in a log file so you can read the log file and know if someone tried to intrude your system while you have been away. Anyone trying to copy your USB drive and unlock your computer will be disheartened because the security codes are changed by Predator frequenty. Moreover, Predator disables the Windows task manager so that nobody can kill the process by pressing Ctrl + Alt + Del.

Techie Buzz Verdict

Predator does what it says and works perfectly in Windows XP, Windows Vista and Windows 7. If you lose the USB drive, you can regain control as Predator lets you set a password which will unlock session if your USB stick isn’t available. I love the simplicity of the application and this is a must use tool for those who work in an unsecured environment.

Techie Buzz rating: 4.5/5 (very good).

McAfee Security Scan Plus – Advice That You May Not Want

Recently, I wrote about Secunia’s Online Software Inspector. It scanned my netbook and found several programs that it believed were out of date. As you probably know, out of date programs can give hackers an easy way to gain access to a PC. One of the programs I needed to update was Adobe Acrobat Reader.

I went to the Adobe site to get the latest updated version and while there, I saw an offer for a free copy of McAfee’s Security Scan Plus. I had never heard of it before, and my curiosity would not let me pass it up.


The McAfee product installed right after Adobe finished. A few days later, I finally got around to trying it out. Here’s the first thing you will see upon launching it. It’s a simple welcome screen, nothing more.


Next, you’ll see that you must update this product in order to use it.


The update didn’t take long and they provided an interesting animation while I waited.


Next it started scanning my PC. I was anxious to see the results at this point.

WinPatrol Lifetime License for 99¢ – One Day Only

I don’t check my Twitter very often. I was surprised to catch a tweet that I consider breaking news. The author of the excellent WinPatrol security software for Windows has gone a little crazy. Here’s what he says on his blog.

I’m curious and thinking a crazy single day experiment could be fun and may be worth the risk. So what the hell. If you want to upgrade to WinPatrol PLUS on January 29th, I’ll give you a lifetime WinPatrol membership for less than a dollar. (normally $29.95 USD)

I’ve used the free version of WinPatrol many times over the last few years. Last year we wrote an article telling you how to use WinPatrol to speed up Windows startup by delaying less important startup programs. That’s only one way to use WinPatrol. It’s been listed at Gizmo’s as a Best Free Intrusion Prevention and Detection Utility for Home Use. The PLUSedition of WinPatrol has some features in it that are going to be worth far more than a dollar to most users.

I’ll take a few moments here to tell you about some of it’s other important features.


As you can see, the program offers you 13 tabs full of information about the programs, services and settings on your PC. These include:

• Startup Programs
• Delayed Start
• ActiveX
• IE Helpers
• Scheduled Tasks
• Services
• Active Tasks
• Cookies
• File Types
• Hidden Files
• Recent
• PLUS Information
• WinPatrol Options

Each one of those tabs typically allow you to not only see what’s going on in your PC, but to also make changes to those areas. WinPatrol normally runs as an icon in your System Tray and notifies you when important PC settings are changed. Once notified, you are given the chance to deny those changes.

The PLUS section gives you access to WinPatrol’s exclusive information about the normally unknown processes that run on your PC.

There’s also a portable version of WinPatrol called WinPatrolToGo that can be taken with you on a flash drive or other portable media.

The 99 ¢ offer is available only on January 29th at:


Techie Buzz Verdict:

The free version of WinPatrol is a great addition to the security of any Windows PC. Adding the PLUS features for a small lifetime fee of 99 cents is a real bargain that many people should consider. Remember that this offer is only good on January 29th 2010, one day only.

Techie Buzz Rating: 4/5

Verify MD5 Checksum Integrity Of a Downloaded File

In the past we have discussed what MD5 checksums are, and what their importance is when it comes to downloading files from the Internet. Verifying the MD5 checksum is very important when you want to ensure that no one else has modified or hacked the file you just downloaded.


The MD5 checksums do not change just by itself, until and unless the file(s) you downloaded has been modified by someone. Nero has just released a which will allow you to verify the MD5 checksum for your downloaded file.

Download Nero MD5 Checksum Verifier