This website provides you amazing and exciting Facts and Knowledge about everything.

Saturday, 25 August 2012

Top 10 Most Expensive Houses in the World




List of World’s Most Expensive Houses



Rank
House Name
Current Value
1
Gold house
$ 12.2 Billion
2
Antilla
$ 1.00 Billion
3
Villa Leopolda
$ 736 Million
4
The Penthouse
$ 225 Million
5
Henley Mansion
$ 218 Million
6
Fairfield Pond
$ 198 Million
7
Hearst Mansion
$ 165 Million
8
Franchuk Villa
$ 161 Million
9
The Pinnacle
$ 155 Million
10
The Manor
$ 150 Million

10. The Manor

Built in 1991 by Aaron Spelling and modeled after a French chateau, it covers 58,000 square feet and has 123 rooms, bowling alley, a gym, pool, tennis court, movie theater, and an entire wing for Spelling’s wife’s wardrobe. Situated in Los Angeles, California it is the most expensive residential real estae listing in the States with a price tag of $ 150 Million.

9. The Pinnacle



The biggest house in the exclusive “Yellowstone Club” ski and golf community in Montana, this structure has 10 bedrooms, fireplaces in every bathroom and a unique chair lift directly from back door to the nearby ski-resort. Owned by Tim Blixseth this place is currently priced at $ 155 Million, it is rather a ski-resort than a house.

8. Franchuk Villa


The five storey Victorian Villa complete with marble panelling and basement swimming pools, this structure boasts 21,000 square feet of living space with 20 foot high ceilings, a sauna, gym, movie theatre, and news room. Another standard feature it includes is a panic room that is present in almost every multi-million dollar mansion. Located in Kensigton, London, England it was bought by Ukrainian businesswoman Elena Franchuk and considered the world’s most expensive single residential dwelling at $161 Million.

7. Hearst Mansion


Built by newspaper tycoon William Randolph Hearst, this massive creation was also featured in the movie “The Godfather”. Residing in Beverly Hills, Californai, it includes 6 residences,29 bedrooms, 3 pools, a nightclub and tow giant towers modeled after the church of Santa Maria Mayor of Spain. This is where the 35th President of United States John F. Kennedy spent his hhoneymoon and is currently priced at $165 Million.

6. Ira Rennert (Fairfield Pond)


Currently the most valuable home in United States, built on over 110,000 square feet with 66,000 square-foot main house with 29 bedrooms and 39 bathrooms, this is the fourth most expensive house on our list. This palace is completed with a basketball court, bowling alley, two tennis courts, two squash courts and a $150,000 hot tub managed to have a property tax of $397,559 in 2007 and is currently valued at $198 Million.

5. Henley Mansion


This extravagant mansion covers almost 3000 square metres of livin space complete with state-of-the-art security system, helipad,spa complex, home cinema and two golf courses. Now owned by a Russian billionaire for $218 Million, this structure is 300-years old now with numerous stories of haunting and a dark past to back all up.

4. The Penthouse at One Hyde Park


Third on the list is the $225 Million flat in London’s richest quarter. Neighbouring 82 other apartments in the building costing more than $9000 per square foot, the building features bulletproof windows, iris scanners and “panic room” for security purposes with British SAS watching over the building. Reports of the pending penthouse also include floor-to-ceiling refrigerators and a 24-hour room service

3. Villa Leopolda


Built by King Leopold II of Belgium in 1902, is a 27 stories summer home with 19 bedrooms and 50 full-time gardeners. This spectacular home in French Reviera of 29,00 square foot has one of the best beachfront views in the south of France. Formerly owned by the richest person in the world Bill Gates, this masterpiece stands at the staggering price of around $736 Million in the market today.

2. Antilla


It  had set the record for the most expensive house in the world was set in 2009 when Indian miltibillionaire Mukesh Ambani moved to their new home “Antilla” in Mumbai, India. Built in accordance with Vaastu Shastra, this modern day palace is 570 feet tall, 27-storey with six floors of parking, a health level with jacuzzi, gym and “ice room”, a ballroom level, four story garden and floors with bedrooms and bathrooms along with a staff of around 600. Each floor is unique in its design looking like a different house with every next level. The current price for this house stands at $ 1.00 Billion.

1. Gold house


Currently rumored to be the most expensive house ever built costing over $ 12.2 Billion by "King of Bling", Stuart Hughes, is the house located in a secret location in Switzerland. Known as the world’s first “Gold-house”, with 200.000 kilograms of solid gold and platinum fixtures and fittings and the specially designed flooring made from meteoric stone with shavings of original 65 million year old T-Rex Dinosaur bones embedded in each tile. Sitting on 2,442 square meters, it has living space of 752 square meters with 338 square meters of terrace, wine cellar of 25 square meters, 8 rooms and a 4 car garage. It might be a little over-exaggerated according to the sources.

 


 


 


 


 


 


 




 

Tuesday, 21 August 2012

Top 10 Most Beautiful Mosques In The World

Mosque (Masjid) is a very holy place of worship for Muslims. The main purpose of the mosque is to serve as a place where Muslims can come together for prayer, but mosques are also famous for the general importance to Muslims as well as for Islamic architecture and Islamic culture.

10. Putrajaya Mosque Malaysia

  

09. Ubudiah Mosque Kuala Kangsar

  

08. Blue Mosque Istanbull

  

07. Crystal Mosque Malaysia



06. Masjid Jame Asr Hassanil Bolkiah, Brunei


05. Sheikh Zayed Mosque Abu Dhabi, UAE

 

04. Faisal Mosque Pakistan

 

03. Sultan Omar Ali Saifuddin Mosque Brunei

 

02. Masjid Nabavi Saudi Arabia

 

01. Masjid al Haram (The Holy Mosque) Saudi Arabia

 

 

 

 

 

 

 

 


Saturday, 18 August 2012

The happy smiling pansy


Pansy is a group of hybrid flowers that are cultivated as garden flower,pansies are much popular with their unique shape and their happy smiling faces,it seems like they have two eyes,a happy mouth and a tiny nose that is enough to make people happy.
Pansies grow in cool places,so its needed to be shaded from hot bright sun.. :)

Tuesday, 14 August 2012

Insanity Thrill Ride at Stratosphere Tower


Insanity Thrill Ride at Stratosphere Tower, Las Vegas has seats tethered to an arm that swings out beyond the tower leaving riders dangling 1000 feet in the air. As the ride begins its circular motion at approximately forty miles per hour. Furthermore the ride turns you face down over the street below as its spins faster and faster and you find yourself flung out at a 70-degree angle. Once you have left the thrill of this ride, your wobbly legs insist that you sit down for a moment. You are sure to find this ride an extreme adventure.

Monday, 13 August 2012

Liverpool Villahermosa / Iñaki Echeverria


The project’s challenge was to find a simple and effective construction system that would accelerate the production, assembly, and installation of the façade and, at the same time, provide a complex and interesting proposal.


Given Tabasco’s tropical climate and its severe solar incidence and humidity levels, concrete was selected as the project’s design material; a material both resistant and with extraordinary aging qualities. With the development of innovative construction technologies, the project would seek a new image for Liverpool.



The solution emerged from a research and development process, where the concrete’s potential and ability to form complex geometries was explored. On the other hand, extensive trial and error processes were applied involving different pouring methods and formwork materials, such as, fiberglass, concrete and sand.
 




The result was a façade that’s built by combining 5 different types of precast pieces shaped like a propeller. Each propeller rotates 180° on its axis; heights vary between 16 to 20 meters, depending on their position.



These simple and controlled variations create numerous results for each piece, which as a whole, give a sense of movement; this effect is better appreciated at a distance and when passing trough by car at high speed. From up close, the concrete looks like a fine wood; the acid layer applied as a final coating, brings out the concrete’s grain, which in return, gives the material this odd appearance.


Additionally, the light changes that occur during the day, and the artificial lighting at night, provide an interesting mixture of colors, reflections and shadows, achieving an always changing and never static image for the façade.


Sunday, 12 August 2012

Intel® Core™ i7 Processor


Introduction


The Intel Penryn mircoarchitecture, which included the Core 2 family of processors, was the first mainstream Intel microarchitecture based on the 45nm fabrication process. This allowed Intel to create higher-performance processors that consumed similar or less power than previous-generation processors.

The Intel Nehalem microarchitecture that encompasses the Core i7 class of processors uses a 45nm fabrication process for different processors in the Core i7 family. Besides using the power consumption benefits of 45nm, Intel made some dramatic changes in the Nehalem microarchitecture to offer new features and capabilities in the Core i7 family of processors. This white paper explores the details on some key features and their impact on test, measurement, and control applications.

1 – New Platform Architecture

As shown in Figure 1, the previous Intel microarchitectures for a single processor system included three discrete components: a CPU; a Graphics and Memory Controller Hub (GMCH), also known as the northbridge; and an I/O Controller Hub (ICH), also known as the southbridge. The GMCH and ICH combined are referred to as the chipset.
In the older Penryn architecture, the front-side bus (FSB) was the interface for exchanging data between the CPU and the northbridge. If the CPU had to read or write data into system memory or over the PCI Express bus, then the data had to traverse over the external FSB. In the new Nehalem microarchitecture, Intel moved the memory controller and PCI Express controller from the northbridge onto the CPU die, reducing the number of external databus that the data had to traverse. These changes help increase data-throughput and reduce the latency for memory and PCI Express data transactions. These improvements make the Core i7 family of processors ideal for test and measurement applications such as high-speed design validation and high-speed data record and playback.

Figure 1: These block diagrams represent the higher-level architectural differences between the previous generation of Intel microarchitectures and the new Nehalem microarchitecture for single-processor systems.

 2 – Higher-Performance Multiprocessor Systems with QPI
Not only was the memory controller moved to the CPU for Nehalem processors, Intel also introduced a distributed shared memory architecture using Intel QuickPath Interconnect (QPI). QPI is the new point-to-point interconnect for connecting a CPU to either a chipset or another CPU. It provides up to 25.6 GB/s of total bidirectional data throughput per link.

Intel’s decision to move the memory controller in the CPU and introduce the new QPI databus has had an impact for single-processor systems. However, this impact is much more significant for multiprocessor systems. Figure 2 illustrates the typical block diagrams of multiprocessor systems based on the previous generation and the Nehalem microarchitecture.

  Figure 2: These block diagrams represent the higher-level architectural differences between the previous generation of Intel microarchitectures and the new Nehalem microarchitecture for multiprocessor systems.

The Nehalem microarchitecture integrated the memory controller on the same die as the Core i7 processor and introduced the high-speed QPI databus. As shown in Figure 2, in a Nehalem-based multiprocessor system each CPU has access to local memory but they also can access memory that is local to other CPUs via QPI transactions. For example, one Core i7 processor can access the memory region local to another processor through QPI either with one direct hop or through multiple hops.

With these new features, the Core i7 processors lend themselves well to the creation of higher-performance processing systems. For maximum performance gains in a multiprocessor system, application software should be multithreaded and aware of this new architecture. Also, execution threads should explicitly attempt to allocate memory for their operation within the memory space local to the CPU on which they are executing.

By combining a multiprocessor computer with PXI-MXI-Express to a PXI system, processor intensive applications can take advantage of the multiple CPUs. Examples of these types of applications range from design simulation to hardware-in-the-loop (HIL).

3 – CPU Performance Boost via Intel Turbo Boost Technology

About five years ago, Intel and AMD introduced multicore CPUs. Since then a lot of applications and development environments have been upgraded to take advantage of multiple processing elements in a system. However, because of the software investment required to re-architect applications, there are still a significant number of applications that are single threaded. Before the advent of multicore CPUs, these applications saw performance gains by executing on new CPUs that simply offered higher clock frequencies. With multicore CPUs, this trend was broken as newer CPUs offered more discrete processing cores rather than higher clock frequencies.
To provide a performance boost for lightly threaded applications and to also optimize the processor power consumption, Intel introduced a new feature called Intel Turbo Boost. Intel Turbo Boost is an innovative feature that automatically allows active processor cores to run faster than the base operating frequency when certain conditions are met.
Intel Turbo Boost is activated when the OS requests the highest processor performance state. The maximum frequency of the specific processing core on the Core i7 processor is dependent on the number of active cores, and the amount of time the processor spends in the Turbo Boost state depends on the workload and operating environment.

  Figure 3: Intel Turbo Boost features offer processing performance gains for all applications regardless of the number of execution threads created.

Figure 3 illustrates how the operating frequencies of the processing cores in the quad-core Core i7 processor change to offer the best performance for a specific workload type. In an idle state, all four cores operate at their base clock frequency. If an application that creates four discrete execution threads is initiated, then all four processing cores start operating at the quad-core turbo frequency. If the application creates only two execution threads, then two idle cores are put in a low-power state and their power is diverted to the two active cores to allow them to run at an even higher clock frequency. Similar behavior would apply in the case where the applications generate only a single execution thread.
The Intel Core i7-820QM quad-core processor that is used in the NI PXIe-8133 embedded controller has a base clock frequency of 1.73 GHz. If the application is using only one CPU core, Turbo Boost technology automatically increases the clock frequency of the active CPU core on the Intel Core i7-820QM processor from 1.73 GHz to up to 3.06 GHz and places the other three cores in an idle state, thereby providing optimal performance for all application types.




Number of Active Cores

Mode

Base Frequency
Maximum Turbo Boost Frequency
4Quad-Core1.73 GHz2.0 GHz
2Dual-Core1.73 GHz2.8 GHz
1Single-Core1.73 GHz3.06 GHz
  
Figure 4: This table showcases how Turbo Boost is able to increase the performance for a variety of applications when using the PXIe-8133 in quad-core, dual-core, or single-core mode. 

The duration of time that the processor spends in a specific Turbo Boost state depends on how soon it reaches thermal, power, and current thresholds. With adequate power supply and heat dissipation solutions, a Core i7 processor can be made to operate in the Turbo Boost state for an extended duration of time. In the case of the NI PXIe-8133 embedded controller, users can manually control the number of active processor cores through the controller’s BIOS to fine tune the operation of the Turbo Boost feature for optimizing performance for specific application types.
For real-time applications, Intel Turbo Boost could be utilized, but to ensure best possible execution determinism thorough testing should be done. When using the NI PXIe-8133 embedded controller, Intel Turbo Boost can be disabled through the BIOS for applications that prefer to not use it.

4 – Improved Cache Latency with Smart L3 Cache

Cache is a block of high-speed memory for temporary data storage located on the same silicon die as the CPU. If a single processing core, in a multicore CPU, requires specific data while executing an instruction set, it first searches for the data in its local caches (L1 and L2). If the data is not available, also known as a cache-miss, it then accesses the larger L3 cache. In an exclusive L3 cache, if that attempt is unsuccessful, then the core performs cache snooping – searches the local caches of other cores – to check whether they have data that it needs. If this attempt also results in a cache-miss, it then accesses the slower system RAM for that information. The latency of reading and writing from the cache is much lower than that from the system RAM, therefore a smarter and larger cache greatly helps in improving processor performance.

The Core i7 family of processors features an inclusive shared L3 cache that can be up to 12 MB in size. Figure 4 shows the different types of caches and their layout for the Core i7-820QM quad-core processor used in the NI PXIe-8133 embedded controller. The NI PXIe-8133 embedded controller features four cores, where each core has 32 kilobytes for instructions and 32 kilobytes for data of L1 cache, 256 kilobytes per core of L2 cache, along with 8 megabytes of shared L3 cache. The L3 cache is shared across all cores and its inclusive nature helps increase performance and reduces latency by reducing cache snooping traffic to the processor cores. An inclusive shared L3 cache guarantees that if there is a cache-miss, then the data is outside the processor and not available in the local caches of other cores, which eliminates unnecessary cache snooping.


 Figure 5: The inclusive shared L3 cache in the Core i7 processors offers better cache latency for increased performance.







This feature provides improvement for the overall performance of the processor and is beneficial for a variety of applications including test, measurement, and control.

5 – Optimized Multithreaded Performance through Hyper-Threading

Intel introduced Hyper-Threading Technology on its processors in 2002. Hyper-threading exposes a single physical processing core as two logical cores to allow them to share resources between execution threads and therefore increase the system efficiency (see Figure 5). Because of the lack of OSs that could clearly differentiate between logical and physical processing cores, Intel removed this feature when it introduced multicore CPUs. With the release of OSs such as Windows Vista and Windows 7, which are fully aware of the differences between logical and physical core, Intel brought back the hyper-threading feature in the Core i7 family of processors.
Hyper-Threading Technology benefits from larger caches and increased memory bandwidth of the Core i7 processors, delivering greater throughput and responsiveness for multithreaded applications.



 Figure 6: Hyper-threading allows simultaneous execution of two execution threads on the same physical CPU core.


 6 – Higher Data-Throughput via PCI Express 2.0 and DDR3 Memory Interface
To support the need of modern applications to move data at a faster rate, the Core i7 processors offer increased throughput for the external databus and its memory channels.
The new processors feature the PCI Express 2.0 databus, which doubles the data throughput from PCI Express 1.0 while maintaining full hardware and software compatibility with PCI Express 1.0. A x16 PCI Express 2.0 link has a maximum throughput of 8 GB/s/direction.
To allow data from the PCI Express 2.0 databus to be stored in system RAM, the Core i7 processors feature multiple DDR3 1333 MHz memory channels. A system with two channels of DDR3 1333 MHz RAM had a theoretical memory bandwidth of 21.3 GB/s. This throughput matches well with the theoretical maximum throughput of a x16 PCI Express 2.0 link. The NI PXIe-8133 embedded controller uses both of these features to allow users to theoretical stream data at 8 GB/s in a PXI Express system.
Certain test and measurement applications – such as high-speed design validation and RF record and playback – that require continuous acquisition or generation of data at extremely high rates benefit greatly from these improvements.

7 – Improved Virtualization Performance

Virtualization is a technology that enables running multiple OSs side-by-side on the same processing hardware. In the test, measurement, and control space, engineers and scientists have used this technology to consolidate discrete computing nodes into a single system. With the Nehalem mircoarchitecture, Intel has added new features such as hardware-assisted page-table management and directed I/O in the Core i7 processors and its chipsets that allow software to further improve their performance in virtualized environments.
These improvements coupled with increases in memory bandwidth and processing performance allow engineers and scientists to build more capable and complex virtualized systems for test, measurement, and control.

8 – Remote Management of Networked Systems with Intel Active Management Technology (AMT)

AMT provides system administrators the ability to remotely monitor, maintain, and update systems. Intel AMT is part of the Intel Management Engine, which is built into the chipset of a Nehalem-based system. This feature allows administrators to boot systems from a remote media, track hardware and software assets, and perform remote troubleshooting and recovery.

Engineers can use this feature for managing deployed automated test or control systems that need high uptime. Test, measurement, and control applications are able to use AMT to perform remote data collection and monitor application status. When an application or system failure occurs, AMT enables the user to remotely diagnose the problem and access debug screens. This allows for the problem to be resolved sooner and no longer requires interaction with the actual system. When software updates are required, AMT allows for these to be done remotely, ensuring that the system is updated as quickly as possible since downtime can be very costly. AMT is able to provide many remote management benefits for PXI systems.
For customers using the NI PXIe-8133, National Instruments offers a NI Labs download that enables AMT capabilities on this embedded controller.

Conclusion

The Core i7 family of processors based on the Intel Nehalem microarchitecture offers many new and improved features that benefit a wide variety of applications including test, measurement, and control. Engineers and scientists can expect to see processing performance gains as well as increases in memory and data throughput when comparing this microarchitecture to previous microarchitectures.


How to Prevent and Remove Viruses and Other Malware

What is a computer virus?A computer virus is a small software program that spreads from one computer to another and interferes with computer operation. A computer virus might corrupt or delete data on a computer, use an email program to spread the virus to other computers, or even delete everything on the hard disk. 

Computer viruses are frequently spread by attachments in email messages or by instant messaging messages. Therefore, you must never open an email attachment unless you know who sent the message or you are expecting the email attachment. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread through downloads on the Internet. They can be hidden in pirated software or in other files or programs that you might download. 

Symptoms of a computer virus
What is a worm?A worm is computer code that spreads without user interaction. Most worms begin as email attachments that infect a computer when they're opened. The worm scans the infected computer for files, such as address books or temporary webpages, that contain email addresses. The worm uses the addresses to send infected email messages, and frequently mimics (or spoofs) the "From" addresses in later email messages so that those infected messages seem to be from someone you know. Worms then spread automatically through email messages, networks, or operating system vulnerabilities, frequently overwhelming those systems before the cause is known. Worms aren't always destructive to computers, but they usually cause computer and network performance and stability problems. 



What is a trojan horse?A trojan horse is a malicious software program that hides inside other programs. It enters a computer hidden inside a legitimate program, such as a screen saver. Then it puts code into the operating system that enables a hacker to access the infected computer. Trojan horses do not usually spread by themselves. They are spread by viruses, worms, or downloaded software. 


What is spyware?Spyware can install on your computer without your knowledge. These programs can change your computer’s configuration or collect advertising data and personal information. Spyware can track Internet search habits and can also redirect your web browser to a different website than you intend to go to. 

What is rogue security software?A rogue security software program tries to make you think that your computer is infected by a virus and usually prompts you to download or buy a product that removes the virus. The names of these products frequently contain words like Antivirus, Shield, Security, Protection, or Fixer. This makes them sound legitimate. They frequently run right after you download them, or the next time that your computer starts. Rogue security software can prevent applications, such as Internet Explorer, from opening. Rogue security software might also display legitimate and important Windows files as infections. Typical error messages or pop-up messages might contain the following phrases: 

Warning!
Your computer is infected!
This computer is infected by spyware and adware.


Note If you receive a message in a popup dialog box that resembles this warning, press ALT + F4 on your keyboard to close the dialog box. Do not click anything inside the dialog box. If a warning, such as the one here, keeps appearing when you try to close the dialog box, it’s a good indication that the message is malicious. 

Are you sure you want to navigate from this page?
Your computer is infected! They can cause data lost and file corruption and need to be treated as soon as possible. Press CANCEL to prevent it. Return to System Security and download it to secure your PC.
Press OK to Continue or Cancel to stay on the current page.


If you see this kind of message, then don't download or buy the software. 

What is malware?Malware is a term that is used for malicious software that is designed to do damage or unwanted actions to a computer system. Examples of malware include the following:
  • Viruses
  • Worms
  • Trojan horses
  • Spyware
  • Rogue security software


How to remove malware such as a virus, spyware, or rogue security softwareRemoving a computer virus or spyware can be difficult without the help of malicious software removal tools. Some computer viruses and other unwanted software reinstall themselves after the viruses and spyware are detected and removed. Fortunately, by updating the computer and by using malicious software removal tools, you can help permanently remove unwanted software. 


Note If you cannot access the Internet on your computer, use another computer to help you follow the steps in the “How to reset your Internet Explorer proxy settings” section on the computer that may be infected. 

To remove a computer virus and other malicious software, follow these steps in order. 

Install the latest updates from Microsoft UpdateNote A computer virus may prevent you from accessing the Microsoft Update website to install the latest updates. We recommend that you set the Automatic Updates service to run automatically so that a computer is not missing any important updates.Windows Vista and Windows 7
  1. Click Start, and then type Windows Update in the search box.
  2. In the results area, click Windows Update.
  3. Click Check for Updates.
  4. Follow the instructions to download and install the latest Windows Updates.
Windows XP
  1. Click Start, and then click Run.
  2. Type sysdm.cpl, and then press Enter.
  3. Click the Automatic Updates tab, and then click the Automatic (recommended) option.
  4. Click OK.


Use the free Microsoft Safety ScannerMicrosoft offers a free online tool that scans and helps remove potential threats from your computer. To perform the scan, go to the Microsoft Safety Scanner website. 

Use the Windows Malicious Software Removal Tool
Manually remove the rogue security softwareIf the rogue security software can’t be detected or removed by using Microsoft Safety Scanner or the Windows Malicious Software Removal Tool, try the following steps:
  1. Note the name of the rogue security software. For this example, we'll call it XP Security Agent 2010.
  2. Restart your computer.
  3. When you see the computer's manufacturer's logo, repeatedly press the F8 key.
  4. When you are prompted, use the arrow keys to highlight Safe Mode with Networking, and then press Enter.
  5. Click Start and check whether the rogue security software appears on the Start menu. If it's not listed there, clickAll Programs and scroll to find the rogue security software's name.
  6. Right-click the name of the rogue security software program, and then click Properties.
  7. Click the Shortcut tab.
  8. In the Properties dialog box, check the path of the rogue security software program that is listed in Target. For example, C:\Program Files\XP Security Agent 2010.

    Note The folder name frequently is a random number.
  9. Click Open File Location.
  10. In the Program Files window, click Program Files in the address bar.
  11. Scroll until you find the rogue security software program folder. For example, XP Security Agent 2010.
  12. Right-click the folder, and then click Delete.
  13. Restart your computer.
  14. Go to the Microsoft Safety Scanner website.
  15. Follow the steps to run the scan and to help remove the rogue security software.
If you suspect that your computer is infected with rogue security software that was not detected by using Microsoft security solutions, you can submit samples by using the Microsoft Malware Protection Center submission form.



Install and run Microsoft Security EssentialsMicrosoft offers a free malicious removal program called Microsoft Security Essentials that helps protect your computer from becoming infected. To install Microsoft Security Essentials, follow these steps:
  1. Go to the Microsoft Security Essentials website.
  2. Click Free Download.
  3. Click Run, and then follow the instructions to install Microsoft Security Essentials.
  4. After installation, restart your computer.
  5. Click Start, click All Programs, and then click Microsoft Security Essentials.
  6. On the Home tab, select the Full scan option, and then click Scan now.


Install Windows Defender OfflineWindows Defender Offline is a malware tool that helps remove difficult to eliminate viruses that start before Windows starts. To use Windows Defender Offline, follow these steps:
  1. On an uninfected computer.
  2. Click Download the 32 bit version or Download the 64 bit version, depending on which operating system that you are running. If you're unsure of which operating system that you are running.
  3. When you are prompted, click Save As, and then save the file to a DVD, CD, or USB flash drive.
  4. On the infected computer, insert the DVD, CD, or USB flash drive, and then restart the computer.
  5. When you are prompted, press a key to select an option to use to start your computer, such as F12, F5, or F8, depending on the kind of computer that you are using.
  6. Use the arrow key to scroll to the drive where you installed Windows Defender Offline file. Windows Defender Offline starts and immediately scans for malware.

How to protect your computer against malwareThere are actions that you can take to help protect your computer against malware. 

Turn on the firewall
  • For information about how to turn on your firewall in Windows 7, go to the Turn Windows 7 Firewall on or offwebsite.
  • For information about how to turn on your firewall in Windows Vista, go to the Turn Windows Vista Firewall on or off website.
  • For information about how to turn on your firewall in Windows XP, see the following article in the Microsoft Knowledge Base:


Keep your computer up to date
Install Microsoft Security Essentials and keep it up to date
Don’t be tricked into downloading malwareHere are some tips that can help protect you from downloading software that you don't want:
  • Only download programs from websites that you trust. If you're not sure whether to trust a program that you want to download, enter the name of the program into your favorite search engine to see whether anyone else has reported that it contains spyware.
  • Read all security warnings, license agreements, and privacy statements that are associated with any software that you download.
  • Never click "Agree" or "OK" to close a window that you suspect might be spyware. Instead, click the red "x" in the corner of the window or press Alt + F4 on your keyboard to close a window.
  • Be wary of popular "free" music and movie file-sharing programs, and make sure that you understand all the software packaged with those programs.
  • Use a standard user account instead of an administrator account.


How to reset your Internet Explorer proxy settingsMalicious software might change Internet Explorer proxy settings, and these changes can prevent you from accessing Windows Update or any Microsoft Security sites. 

To have us change your Internet Explorer proxy settings for you, follow these steps:
  1. On an uninfected computer, see the following article in the Microsoft Knowledge base:
  2. Go to the Fix it for me section.
  3. Click the Fix it button. Save the file to a flash drive or a CD when you are prompted.
  4. Insert the flash drive or CD in the infected computer.
  5. Start Windows, click Start, and then click Run.
  6. Click Browse.
  7. Select the location of the flash drive or CD. Double-click the file that you saved, and then click Open.
To change your Internet Explorer proxy settings yourself, follow these steps:
  1. Click Start, and then click Run.
  2. In the Run box, copy and paste the following:
    reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyEnable /t REG_DWORD /d 0 /f
  3. Click OK.
  4. Click Start, and then click Run.
  5. In the Run box, copy and paste the following:
    reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyServer /f
  6. Click OK.

Related Posts Plugin for WordPress, Blogger...