The best online antivirus

As a way to promote their products, most major antivirus developers offer a website where, without having to install software, users can access analysis and cleaning our PC online.

The operation is similar to common antivirus. But beware, the online antivirus does not replace the antivirus installed on the PC, which we should download, install and update. We only will be useful in case of problems and not being able to access our usual antivirus.

The best online antivirus


A fully functional antivirus with all the necessary elements to locate and remove viruses from your computer. It is able to perform a scan of memory, all files, folders and drives, in addition to boot sectors.

By default, BitDefender will try to disinfect the infected files. If disinfection fails, the infected files will be deleted without notice. However, you can change this setting for the program to take other action in the treatment of infected files.

The best online antivirus

If you wish, you can try this tool by clicking on this link.

Trend Micro HouseCall

Trend Micro HouseCall is an application to check if your computer was infected by a virus, spyware or other malware. HouseCall performs additional security checks to identify and fix vulnerabilities and to prevent reinfection.

The best online antivirus

If you wish, you can try this tool by clicking on this link.

ESET Online Scanner

The ESET Online Scanner is a free online service, simple and fast, which makes a virtual anti-tracking threats. This service makes through a web browser a detailed scan of the computer to identify viruses, spyware and other online threats, in addition to remove them.

Using this tool, users of other antivirus solutions may certify the confidence level of your current antivirus and see if it is really effective. This service eliminates malicious code without the need to uninstall the current antivirus and has the same ThreatSense technology (available in NOD32).

The best online antivirus

The ESET Online Scanner does not replace the real-time protection, seen that it is a low-demand tool that detects and removes malicious code that are already on your computer. To have the real and permanent protection time is needed to install an antivirus capable of ensuring the full protection of your computer and the entire network solution.

If you wish, you can try this tool by clicking on this link.

Panda Cloud Cleaner

Panda Cloud Cleaner is perhaps the most interesting and useful option of all mentioned in this article. This is due to its impressive detection rates, indeed, Panda is able to find threats where all other antivirus failed.

This is closely related to the called “collective intelligence”, an analysis model based on the results obtained from the virus scanning of the millions of computers that use the software. This ensures that the level of security that is achieved is extremely high, and also that is updated almost instantly.

The best online antivirus

Notably Panda Cloud Cleaner can be used as the default antivirus system, provided of course have access to the Internet.

If you wish, you can use Panda Cloud Cleaner for free by clicking on this link.

F-Secure Online Scanner

Online version of antivirus F-Secure. It is ideal for scanning computers without antivirus or outdated software, or even suspected of contamination with updated antivirus. Use it to see if your computer is infected, and disinfect it if necessary.

The best online antivirus

If you wish, you can try this tool by clicking on this link.

All links were checked. If anyone gives you trouble, please notify us at the bottom of this page.

The most famous viruses in history

From the massification of computers, whose biggest boom began almost three decades ago with the arrival of a PC to every home and even the invasion of internet cafes, computer viruses have had free rein to access devices, and in many cases have come to completely destroy large server systems.

Undoubtedly, the threat of the virus spread in a spectacular way from the great mass of computers as well as Internet, because through this means many people use free access to introduce malware on computers, at the innocence of users who surf the web or download content from websites and p2p clients.

Virus history

It is noteworthy that a computer virus is nothing but a malicious software that has been designed to be able to run automatically and auto replicate. While it is considered that since the sixties there is the presence of malware, the fact is that the term “computer virus” was coined in 1983 by Fred Cohen.

In the history of computing, over the years there have been an immense amount of virus, it would be impossible to try to list them all, but some of this malware stood out from the rest, having a significant impact and reputation, based usually on its destructive power.

In this special report we will review computer viruses most famous in history, which often have wreaked havoc not only on home PCs but also on servers that suffered the loss of their information, causing disorders worldwide.

Core War: The pioneer of malware

Actually, Core War was not a computer virus, but rather a game which spread through one of the first software with malicious features, that affecting the computer memory and could self replicate.

This game was developed by a group of programmers from the company Bell Computer, who in the 60s created a simple application that competed with other programs running on a computer in order to gain absolute control of memory of the team.

Virus history

Thus, Core War became the first program able to achieve self-replicate, thus causing problems in the execution of other applications. That is why, usually considered one of the forerunners of the computer virus in history of computing.

Creeper: The first virus of history

Although surely Core War ushered in the era of computer viruses, the fact is that the famous Creeper was the first virus that included the typical characteristics of a genuine malware.

Creeper was created by Bob Thomas in 1971, and was specially written to attack the Tenex operating system. When Creeper reached a computer, usually through the nodes of the ARPANET, the malware it was self-executing and began to show the following message: “I’m the creeper, catch me if you can!”

Virus history

Reaper: The first antivirus

After several ravages achieved by Creeper, which left several computers in temporary disuse as a way to end this malware, came another virus called Reaper, which is spread through the network for infected machines Creeper to remove.

Thus, the history of computing and computer witnessed the birth of the first antivirus, because despite being designed with characteristics of malware, Reaper ultimately fulfilled a function of antidote to the spread of Creeper.

Viruses in the 80’s

Continuing the story of computer viruses, as mentioned, in the eighties came the real furor over these malicious software that spreading PC to PC, creating different problems in the functioning of the devices that were infected.

It was in 1985 when they began to appear the first Trojan horses or Trojans, that were camouflaged under an image enhancement program graphics called EGABTR, and in another famous game called NUKE-LA.

Over the months, the virus began to spread in the computer universe with increasing speed, also these increasingly complex.

In this sense, the called Brain virus was the first virus that had the power to cause major infections at the time, which began circulating in 1986, and by 1987 he had managed to spread throughout the world.

Brain: The first mass virus

In 1986 began circulating the Brain virus, considered as the first mass computer virus from the history. This virus had been written for MS-DOS with the purpose of attack the system and was fully compatible with IBM PC.

It was created by a group of hometown friends in the city of Lahore, Pakistan, who were responsible for selling distribute copies of the diskettes inserted in pirated commercial software, including the popular Lotus, SuperCalc and WordStar were.

Thus, Brain quickly came to the United States, where more than 20,000 computers were infected within months. The arrival of Brain served to creating more sophisticated malware, not only for their propagation methods but also for its attack methodology.

Virus history

When Brain reaches to a computer, the malware was self-executing and began to infect the boot sector for the disk in the computer BIOS. To avoid being identified, he was hid intercepting and modifying all orders that ran the operating system for virus detection, responding with values indicated that the PC was not infected. Many users do not understand why your computer is not working normally, since apparently they had not been infected.

Such was the popularity achieved this malware, that the Brain programming code was altered countless times by different programmers, thus giving rise to the birth of countless versions of this virus.

The phenomenon became really dangerous when the virus attacked the email systems of IBM Company, after which the Center for Research Thomas J. Watson, in Yorktown Heights, NY, began working in the field of virus.

More viruses and Trojan horses

In the eighties coexisted a lot of virus producing greater or minor damage to computers that managed to infect. Among the most famous cases, we can mention the Jerusalem virus, created by the terrorist sector in Palestine in 1988.

In 1987 the first massive infection of Macintosh computer, infected through the virus called MacMag, also known as Peace occurs. Another famous malware was known as Friday the 13th, followed by malware such as Stone and Dark Avenger.

Virus history

By the late eighties, they had already been detected in the world an amount of virus exceeding 100, which was considered an epidemic, requiring appropriate measures to prevent the advance of these malicious code programs.

Therein lies precisely the fact that today viruses have become one of the main reasons for the loss of information on computers and portable devices.

Melissa: The office suite virus

Continuing the retrospective in the history of computer viruses most famous in history, in March 1999 made its debut the called Melissa virus, who eventually infected more than 100,000 computers in just three days, achieving a new record in as for spreading malware.

Basically, Melissa was a malware virus belonging to the macro type, which are characterized by concealing the malicious source code within the macro in a document.

Thus, Melissa managed to spread through text documents created in Microsoft Word or spreadsheets of Microsoft Excel.

Created by David L. Smith, for its transmission the virus was hidden inside a document that should be read with applications were part of the Microsoft Office suite, which promised to hold a countless passwords to enter a long list of payment pages erotic websites.

Virus history

Each time a user opened the document containing Melissa, the virus could infect the document template default office suite, and from there all files created with the suite contained the macro with the virus code.

It could be said that the absolute success of Melissa it lies in its extreme simplicity, capable of replication and infection method, you should also curiosity of users.

I Love You: Love worm in email

When the nineties left us, precisely in the month of May 2000, it occurred massive computer infection that affected more than 50 million PCs worldwide, causing losses of about 5.500 billion dollars.

The virus that caused such damage was called I Love You, and was created by a Filipino hacker who called himself “Spyder”, who had designed a simple worm written in VBScript language.

I Love You was spread via email. In different parts of the world, users received an email, the sender was known to the receiver of the message, which bore the subject line “ILOVEYOU”.

The email included an attachment with VBScript format entitled “LOVE-LETTER-FOR-YOU.TXT.vbs”, and of course a message in which he was asked the recipient to read the accompanying letter of love.

Virus history

When the user running the script, the virus began to carry out its task, spreading through the forwarded message to all contacts belonging to the user’s address book messages, using the email address.

The method of spread of this virus was through a Trojan designed to destroy all files with extension doc, vbs, vbe, js, jse, css, wsh, sct, hta, jpg and jpeg that were stored on infected computers, replacing these documents by a copy of the script.

I Love You became an epidemic, even in just one week achieve infect the Pentagon, the CIA and the British parliament.

Nimda: The alleged al Qaeda attack

Continuing with the development of the history of the most famous virus in the computer world, we cannot fail to mention the famous Nimda, which actually was the “Admin” word written backwards, and that spread in September 2001 creating a real paranoia worldwide.

A few minutes of initial distribution through Internet, Nimda became in one of the virus more spread of the story, as it managed to infect more than half a million computers in a span of just 12 hours.

Virus history

Nimda: Detection Report

His virulent attack and how they spread caused panic in a large portion of the population, as had spread the rumor that it was a worm distributed by terrorists belonging to al Qaeda group. Nimba used different methods of infection, hence the rapid and voracious spread from computer to computer.

The first technique was through sending a file entitled readme.exe that spread through infected emails and mail clients using the user’s address book.

In addition it produced a buffer overflow, in order to infect web servers working with the Microsoft IIS platform using shared network resources from the infected computer.

Within the web servers, Nimba was responsible for modifying files with html, htm and asp extension, which added them to a malicious JavaScript code that downloaded and executed the worm on computers of customers.

Also it takes advantage of damage caused by other viruses, such as Code Red II and Sadmind that created vulnerability in the access of PCs, leading to the entry of Nimba.

Between the period of 2003 and 2004 they spread massively three similar types of viruses called Blaster, Sasser and Sober, who managed to increase profits computer technical services of those years.

Blaster virus

Blaster, also known as Lovsan, appeared in 2003 causing that hundreds of thousands of users will face the disadvantage that their computers are automatically turned off after a few seconds of being switched on.

For propagation, Blaster used the vulnerability presented by the service DCOM RPC from Windows OS, but after a few days of arriving, the computer worm was offset by a new malware called Welchia, which actually acted as antivirus eliminating Blaster infested computers.

Virus history

Sober virus

Meanwhile, Sober appeared a few months later, being a really much more dangerous threat than its predecessor, and also several variants of this malware, which came to harm until well into 2005.

Some versions of this virus was responsible for disabling the firewall and antivirus that used the user, and then gather e-mail addresses, to which were sent spam messages, in addition to using infected computers in networks bots.

Sasser virus

The third case was called Sasser, who arrived in 2004, and like Blaster, was takes advantage of a Windows operating system vulnerability to carry out their damage and spread.

Specifically, Sasser used LSASS, acronym Subsystem Local Security Authority of Windows, causing a buffer overflow in the executable LSASS. With this, the malware achieve that the operating system automatically stopped after some time to start working.

The spread of Sasser caused immense damage and incalculable losses, as reached not only personal computers, but also infected hospitals, banks, news agencies, companies air and ground travel, universities, and others systems, achieving for a few days that some factories temporarily closed, canceled trips and even patients moved to other health facilities.


Another virus that gained great popularity in recent years was the so-called Conficker, which was detected in late 2008 and today still continues to sow their malicious code to a large number of computers in the world, as they have created countless malware versions based in this virus.

Conficker spreads through the generation of a buffer overflow in a Microsoft Wndows Server operating system service, disabling important services such as Windows Automatic Update, Windows Security Center, Windows Defender and Windows Error Reporting.

After achieving these objectives, the virus contacts a server, which provides instructions to replicate, collect personal information or download other malwares. Conficker is able to bind to key processes in running Windows, such as explorer.exe, svchost.exe and services.exe.

Virus history

Conficker and almost all its versions, also works by infecting removable devices, such as USB flash drives, memory cards and others, as well as those teams working with shared resources without safety devices.

This virus in its first version was very difficult to eradicate, because once your computer was infected with the worm, simultaneously all automatic Windows updates and security applications known as antivirus that were installed on the PC were disabled affected.

In addition, it prevented users access to the official websites of antivirus distribution and eliminated the restore points system, making it impossible to install the necessary solutions to eliminate the virus.


The damage that viruses occur in the computer equipment does not end at this point, and will surely continue in the future, increasingly sophisticated and harmful developments will generate greater problems, so the leading software development companies antivirus work constantly to find the answers to the drawbacks of current threats.

In this line, we can cite the vulnerability that suffers one of the most used operating systems in the world: Windows 7, which according to computer security company Sophos is affected by 8 out of 10 virus of the most popular today.

Virus history

Also consider that Windows 10 is the new target of hackers around the world, so it is advisable to always use a reliable antivirus, regularly updated, and that gives us the assurance that our team is well protected.

If you liked this page, you can share…

6 simple tips for safe surfing

Phishing, identity theft, tabnabbing and many others threats are lurking waiting to we give a misstep. With every passing day new and more sophisticated threats rises to prevent that we enjoy of our Internet browsing. This article looks some tips to keep us safe.

The last versions of Windows are very safe, since this aspect is strengthened by well-designed software, so that chances of being infected is virtually zero. Nevertheless the truth is that many of the Internet viruses with which it can infect a computer, come from the hand of sophisticated deceptions, which means a surely contagion, if we not take the necessary precautions.

Tips safe surfing

From here we can see some simple tips but very effective, that if we pay enough attention, we can keep to our computer completely safe.

Use known and reputable antivirus

First, we must always use antivirus software and firewalls well entrenched in the market. Microsoft Security Essentials, Avast Antivirus and Comodo Antivirus, among others, are highly respected and excellent reputation software.

Tips safe surfing

We must also ensure that our operating system, security software and web browser always have the latest updates installed, provided by manufacturers.

Do not disseminate our email address

It is more than obvious in these times, but it is always important to remember that we should not give our email address to sites or people which do not have safe references. These sites possibly make us victims of spam, or even sell our ID in an email list to companies that resell this information.

Use strong passwords

In the case of passwords or passwords, always remember that under no point of view we must use our name or any word or date that identifies us, such as our favorite sports team or our date of birth.

There is currently a technique carried out by hackers called “social engineering”, which is basically spy to a Facebook user or another social network to find important details about their lives and try to figure out the password using this technique.

Tips safe surfing

A strong password is one that uses a combination of uppercase and lowercase letters with numbers and other signs. Also a good measure is to not use the same password for all services.

Not confirm anything we have not asked

Is really important to remember never press the button “Yes” on a window that we have not requested. This could allow viruses to enter our PC. In case of any doubt or suspect we should always cancel or stop the operation.

Beware of Social Networks

A special case like social networks justifies take quite a while to adjust safety variables offered by the sites that provide this service as Facebook.

Tips safe surfing

This is because now we share much of our lives in these places, and that this information can be accessed by any is a big risk. We should always be very careful with those who want to be our “friends” in social networks, as they may have criminal intentions.

Be careful with the material downloaded from Internet

One of the entry points most commonly used by viruses to infect our computer is undoubtedly the downloads of movies, videos or music through torrents, P2P programs like eMule or Ares or direct downloads from sites like Megaupload or 4Share, since they are a source of trojans and other malicious programs that may damage our computer.

Tips safe surfing

If we take these tips and we implement them, and we add a little common sense to navigate, we can serenely surf the Internet and enjoy all its benefits without compromising the security of our data and our computer.

If you liked this page, you can share…

What is antivirus?

The antivirus software is a program that helps protect your computer against most viruses, worms, trojans and other unwanted invaders that can infect your computer.

Among the major damage that can cause these programs are: loss of microprocessor performance, file deletion, data corruption, exposed confidential information to unauthorized persons and even uninstalling operating system, among other serious problems

What is a Virus

Normally, the antivirus software monitors virus activity in real time and performs periodic checks, or also according to the user’s request, seeking to detect and then terminate or remove computer viruses.

Current antivirus have specific vaccines to tens of thousands of known virtual pests, and offer the ability to detect any abnormality before it becomes a problem. To do this, you use the aforementioned “Monitor”, which allows detect and remove viruses, worms and trojans before they infect your system.

These programs identify the virus thanks to their “signatures”, code patterns that are identifiable by antivirus software. They can also identify viruses due to unexpected behavior or unauthorized access to the system or your documents.

What is a Virus

It is very important to remember the antivirus should be updated regularly, since every day new viruses are discovered, and the products can quickly become obsolete. Some antivirus software can be configured to update automatically. In this case, we recommend that this option is enabled.

Antivirus. Advantages and types

The antivirus software is one of the basic points of a personal security system, alongside firewalls and spyware detectors. As with other categories of software, it is possible to find good free antivirus, and good paid antivirus. Typically, this products monitors virus activity in real time and performs a regular check, or according to user needs.

Besides having one of those programs, you may want to use an online antivirus, which it is not necessary to install on the PC. It is useful in the case of already having suffered an infection, because some viruses and malicious programs prevent the proper functioning of the antivirus and continue to act after a complete check of the system.

What is a Virus

The online antivirus can also be useful when you need to use unknown or suspect systems, such as computers in Internet cafes. Another advantage of online antivirus is that they are always up to date, because they are hosted on the servers of the companies that maintain them.

Most effective antivirus

Over the years, many antivirus programs have appeared on the market, some effective, others less so. In this sense, one of the most popular antivirus software is AVG Antivirus, with nearly 100 million users worldwide, and the famous NOD32, another classic.

AVG Antivirus

What is a Virus

It is also necessary to highlight the qualities of Avast! Antivirus, perhaps one of the most effective on the market.

AVG Antivirus Free Download

Avast! Antivirus

What is a Virus

This is just a small list, and it is the user who must ultimately evaluate the effectiveness of its antivirus software with his own experience.

Avast! Antivirus Free Download