GameVance:
    This program provides access to online browser games. In order to play the games, the user has to
    download an additional software that contains spyware, adware and malware and enables pop ups for
    content the user searches the web for.

Hacktool.Win32/Keydump:
    HackTool:Win32/Keydump is a tool that retrieves Microsoft Windows XP and Microsoft Office product
    keys. It is also capable of modifying the current Windows XP product key and Windows registration
    information.

HitBox:
    This is a tracking cookie that stores information about the user’s interaction with a specific website.
    Like any tracking cookie, it leaves holes in your security system that may enable entry to your system.

HitsLink:
    This is considered a medium threat tracking cookie. It is a small text file stored on the computer when
    visiting web pages. Though it does not pose a risk by itself, malicious use by other software could
    threaten affected users' privacy. It does not spread automatically using its own means.

Huntbar.Stoolbar:
    Huntbar is a search engine directory page that sets itself as your home page. It also adds a search
    toolbar to IE, and sometimes will make your address bar disappear. According to Huntbar's privacy
    policy it collects information this way: Huntbar's Toolbar Service Collects and Stores Information
    about the Web Pages You View, the Data You Enter in Online Forms and Search Fields, and the
    Products You Purchase Online While Using the Toolbar Service. Although Huntbar Does Not Attempt
    to Analyze Web Usage Data to Determine the Identity of Any Huntbar User, Some Information Collected
    by the Toolbar Service Is Personally Identifiable. Huntbar Aggregates and Analyzes the Information it
    Collects to Improve its Service and to Prepare Reports about Aggregate Web Usage and Shopping
    Habits.

IncrediBar:
    This "Toolbar" is classified as Spyware, Adware and HiJacker. Although it is advertised as a Toolbar
    or add-on to improve browsing sessions, it has been discovered that it is used for tracking activity
    on the Internet. It also is capable of redirecting the user to insecure websites, and makes numerous
    modifications to the system that may require a expert assistance. Incredibar is programmed to alter
    the DNS settings, this results in continuous redirections to domain mystart.incredibar.com. The
    program will also inject bookmarks into your favorites and/or bookmarks that you have never visited
    or saved. Incredibar collects all information about user activity, logs every visited site and sends this
    data to marketing companies.
Copyright GCR, Virus Removal, Spyware Removal, Malware Removal, Trojan Removal
Copyright GCR, DSL, Dial-up, Broadband configuration, Networking, Wireless router, troubleshooting
Copyright GCR, Software, Hardware, Maintenance, Computer Security, Data Recovery
Copyright GCR, Small Business, Installations, Email Setup, Setups, Parts, PC, MAC, Windows, Apple
Microsoft Certified and Apple Technicians
Malicious Software Programs
Dunnellon, Florida & Ocala, Florida

    This is Adware and gets installed along with other Adware like PlayPickle. Adware, or advertising-
    supported software, is any software package which automatically plays, displays, or downloads
    advertisements to a computer. These advertisements can be in the form of a pop-up. The object
    of the Adware is to generate revenue for its author. Adware, by itself, is harmless; however,
    some adware may come with integrated spyware such as keyloggers and other privacy-invasive
    software.

Klez the Conquerer:
    The Klez worm, which blends different virus traits, was first detected in October 2001. Klez distributes
    itself like a virus, but sometimes acts like a worm, other times like a Trojan horse. Klez isn't as
    destructive as other worms, but it is widespread, hard to exterminate, and still active. In fact, so far,
    no other virus has stayed in circulation quite like Klez. It spreads via open networks and e-mail
    regardless of the e-mail program you use. Klez sometimes masquerades as a worm-removal tool. It
    may corrupt files and disable antivirus products. It pilfers data from a victim's e-mail address book,
    mixing and matching new senders and recipients for a new round of infection.

LinkSynergy:
    LinkSynergy is a tracking cookie that is placed in your cookie file to which allows consumer browsing
    and also purchasing of habits from the web partners program websites. For different online
    publishers, the company rests the reputation to spread awareness for online publishers.

Malware.Trace:
    This program is also known as Trace Sweeper. Both programs are created to look and feel like a
    legitimate anti-malware program. Like most Rouge programs, this malware pretends to scan your
    computer and displays numerous infections. In order for you to remove the infections you must buy
    the "Full Version" of their product. In reality, there is no real full version. The object is to trick you into
    supplying your credit card information and other personal information to the hacker on the other side.

MaxSecure.RegistryCleaner:
    This file is categorized as Malware and Rogue. Usually the program is installed without the user's
    consent. When activated it will generally flag registry entries as invalid and urges the user to purchase
    the full version. Usually there are no problems with the registry, a rogue program is intended to
    persuade the user to purchase the item.

MediaPlex:
    Mediaplex is a tracking cookie that monitors your internet activity and gathers your personal information.
    The information gathered is sent to the creator of the cookie without your consent.

MicrosoftWindows.FileExe:
    This virus changes the codes in Windows Registry files in order to hide system files and folder, and
    deletes registry stings to keep the computer from opening .exe files. By removing these registry files,
    the computer no longer knows how to open and display the programs. Meanwhile, the virus opens a
    back door to allow the hacker access to your computer. If you feel you have obtained this virus,
    disconnect the unit from the internet and perform a full virus scan.

MicrosoftWindows.Security.FirewallOpenPorts
    This problem is caused by open ports for the Windows Firewall. Usually these ports are closed, or
    opened by user reference. Normally opening ports is not recommended, allowing applications is better
    suited for most users. Malware and trojan may open the ports to enable remote access to an infected
    computer.

Microsoft.WindowsSecuriyCenter.FirewallOverride:
    This security issue is created from malware that enters a code into the system so it can override your
    security system in order to allow itself to be updated with additional instructions. There is no additional
    information on this program.

Microsoft.WindowsSecurityCenter.AntivirusOverride:
    Some malicious software belongs to a family of similar programs with a different signature. This security
    issue is the sister of the malware program Microsoft.WindowsSecurityCenter.FirewallOverride. It is
    designed to disable the computer's anti-virus while it updates its code.

Mirar:
    Mirar is an adware program. It is a commercial Internet Explorer toolbar designed to find and open
    Internet sites that seem to be related to web pages currently being viewed. Such Mirar functionality
    does not work well and annoys numerous users. The adware program also serves commercial
    advertisements while browsing the Internet. Mirar is not classified as a dangerous parasite. However,
    a lot of people are experiencing difficulties while trying to get rid of this threat. It runs on every
    Windows startup.

Misleading.MacroVirus:
    Macro Virus is a Rogue anti-spyware program created to mislead people into believing that their
    computers are infected. The program is downloaded as trialware, and is not capable of removing
    the items detected unless the user pays for the "full" version.

MonitoringTool:Win32/DouglasKeylogger.A:
    This is a freeware monitoring program that monitors user activity such as keystrokes typed. This
    program may be installed without user consent by other programs. Prevention: Enable a firewall
    on your computer, Get the latest computer updates for all your installed software, Use up-to-date
    antivirus software, Use caution when opening attachments and accepting file transfers, Use caution
    when clicking on links to Web pages, Avoid downloading pirated software, Protect yourself against
    social engineering attacks, Use strong passwords. Get the latest computer updates: Updates help
    protect your computer from viruses, worms, and other threats as they are discovered. It is important
    to install updates for all the software that is installed in your computer.

    Use caution when opening attachments and accepting file transfers. Exercise caution with e-mail and
    attachments received from unknown sources, or received unexpectedly from known sources.  Use
    extreme caution when accepting file transfers from known or unknown sources. Exercise caution with
    links to Web pages that you receive from unknown sources, especially if the links are to a Web page
    that you are not familiar with, unsure of the destination of, or suspicious of. Malicious software may be
    installed in your system simply by visiting a Web page with harmful content.

    Avoid downloading pirated software. Threats may also be bundled with software and files that are
    available for download on various torrent sites. Downloading "cracked" or "pirated" software from these
    sites carries not only the risk of being infected with malware, but is also illegal. For more information,
    see 'The risks of obtaining and using pirated software'.

MTC.MakeMeSearch.com:
    This Malware program infects your browsers: Internet Explorer, Google Chrome, Firefox, Safar, Opera
    and others with a code that directs all of your web searches to various unwanted or malicious sites. An
    expamle: you search “School Uniforms”, a list of links appear and you read and click on a link “JC Penny
    School Uniform Sales”. However, instead of directing you to JC Penny, your browser opens an
    advertising site, or adult content site. This program disrupts the normal behavior of your browsers and
    render them useless. This program also hijacks your private information like credit card numbers,
    passwords, codes, etc. It is imperative that this program is removed from your system and all security
    holes in the registry repaired.

My.Freeze.Toolbar:
    This is an adware toolbar and responsible to displays pop ups and annoying commercial advertisement
    on your computer. This is unwanted software for your computer.

MyWebSearch:
    This is realted to MyWay.MyWebSearch. Many users that have this program in their system also have
    numerous Trojans in their registry. Not all companies agree that this is a problem program, just as many
    companies claim that the program is damaging. It is up to the user if they wish to remove the program,
    however, any repair technician will remove it as it has potential to harm the system resources.

MyWay.MyWebSearch:
    The MyWay Searchbar is a computer toolbar program that replaces user's default search engine with
    the one on MyWay's website. This program is classified as adware by some, but not all anti-malware
    applications. It is advisable to remove this product because it takes up a considerable amount of
    system resources.

NoAdware:
    NoAdware is a rogue security program and a clone of Antivirus Professional  v5.0. This parasite
    is a more traditional rogue variant, which actually has a homepage (noadware.net). It is not
    entirely clear how NoAdware enters the system, but the most likely scenario is that it relies on
    trojans, such as Vundo, in doing so. It may also be manually downloaded and installed.
    NoAdware uses misleading advertising to trick users into purchasing it’s “licensed version”. Once
    inside, NoAdware will flood the user with popups and fake system notifications, supposedly to
    inform him of an infection or multiple infections present on the system. It will also perform system
    scans, which return exaggerated or altogether false results.