<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://kb.gt500.org/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>GT500.org Knowledgebase</title>
        <description></description>
        <link>https://kb.gt500.org/</link>
        <lastBuildDate>Sun, 12 Apr 2026 17:03:52 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://kb.gt500.org/lib/tpl/dokuwiki/images/favicon.ico</url>
            <title>GT500.org Knowledgebase</title>
            <link>https://kb.gt500.org/</link>
        </image>
        <item>
            <title>stopdecrypter</title>
            <link>https://kb.gt500.org/doku.php?id=stopdecrypter&amp;rev=1607848069&amp;do=diff</link>
            <description>&lt;div class=&quot;plugin_note notewarning&quot;&gt;You should be using the &lt;a href=&quot;https://www.emsisoft.com/ransomware-decryption-tools/stop-djvu&quot; class=&quot;urlextern&quot; title=&quot;https://www.emsisoft.com/ransomware-decryption-tools/stop-djvu&quot; rel=&quot;ugc nofollow&quot;&gt;Emsisoft Decrypter for STOP Djvu&lt;/a&gt; instead of following the instructions below. You can find more information about the newer decrypter from Emsisoft at &lt;a href=&quot;https://support.emsisoft.com/topic/32045-about-the-stopdjvu-decrypter/&quot; class=&quot;urlextern&quot; title=&quot;https://support.emsisoft.com/topic/32045-about-the-stopdjvu-decrypter/&quot; rel=&quot;ugc nofollow&quot;&gt;this link&lt;/a&gt;.
&lt;/div&gt;
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;getting_your_id_and_mac_with_stopdecrypter&quot;&gt;Getting Your ID and MAC With STOPDecrypter&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;br/&gt;
&lt;br/&gt;

You can get STOPDecrypter from &lt;a href=&quot;https://download.bleepingcomputer.com/demonslay335/STOPDecrypter.zip&quot; class=&quot;urlextern&quot; title=&quot;https://download.bleepingcomputer.com/demonslay335/STOPDecrypter.zip&quot; rel=&quot;ugc nofollow&quot;&gt;this link&lt;/a&gt;. Once you&amp;#039;re done downloading it, follow the instructions below. A number of the steps include pictures to make it easier to see what you&amp;#039;re supposed to do.
&lt;/p&gt;

&lt;p&gt;
Note that it is important to run STOPDecrypter on the computer that was infected. The output from STOPDecrypter is preferred over trying to supply the information yourself.
&lt;/p&gt;

&lt;p&gt;
The creator of STOPDecrypter has an &lt;abbr title=&quot;Frequently Asked Questions&quot;&gt;FAQ&lt;/abbr&gt; at &lt;a href=&quot;https://www.bleepingcomputer.com/forums/t/671473/stop-ransomware-stop-puma-djvu-promo-drume-support-topic/page-50#entry4682102&quot; class=&quot;urlextern&quot; title=&quot;https://www.bleepingcomputer.com/forums/t/671473/stop-ransomware-stop-puma-djvu-promo-drume-support-topic/page-50#entry4682102&quot; rel=&quot;ugc nofollow&quot;&gt;this link&lt;/a&gt; with additional information. Any questions you have should be answered in the &lt;abbr title=&quot;Frequently Asked Questions&quot;&gt;FAQ&lt;/abbr&gt;.&lt;br/&gt;
&lt;br/&gt;

&lt;/p&gt;
&lt;ol&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Open the file you downloaded.&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; When a window opens with two files in it (“README” and “STOPDecrypter”), double-click on the one named &lt;strong&gt;STOPDecrypter&lt;/strong&gt;.&lt;br/&gt;
&lt;a href=&quot;https://kb.gt500.org/lib/exe/fetch.php?media=stopdecrypter_new_001.png&quot; class=&quot;media&quot; title=&quot;stopdecrypter_new_001.png&quot;&gt;&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=400&amp;amp;tok=9b2e65&amp;amp;media=stopdecrypter_new_001.png&quot; class=&quot;media&quot; alt=&quot;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Windows will warn you about the application depending on other files. Click the &lt;strong&gt;Extract all&lt;/strong&gt; button to prevent errors.&lt;br/&gt;
&lt;a href=&quot;https://kb.gt500.org/lib/exe/fetch.php?media=stopdecrypter_new_002.png&quot; class=&quot;media&quot; title=&quot;stopdecrypter_new_002.png&quot;&gt;&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=300&amp;amp;tok=555981&amp;amp;media=stopdecrypter_new_002.png&quot; class=&quot;media&quot; alt=&quot;&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; In the window that opens, click the &lt;strong&gt;Extract&lt;/strong&gt; button to confirm extraction of the files.&lt;br/&gt;
&lt;a href=&quot;https://kb.gt500.org/lib/exe/fetch.php?media=stopdecrypter_new_003.png&quot; class=&quot;media&quot; title=&quot;stopdecrypter_new_003.png&quot;&gt;&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=400&amp;amp;tok=0cda47&amp;amp;media=stopdecrypter_new_003.png&quot; class=&quot;media&quot; alt=&quot;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; A window almost identical to the one in step 2 will open. This shows the extracted files. Double-click on &lt;strong&gt;STOPDecrypter&lt;/strong&gt; again to run it.&lt;br/&gt;
&lt;a href=&quot;https://kb.gt500.org/lib/exe/fetch.php?media=stopdecrypter_new_004.png&quot; class=&quot;media&quot; title=&quot;stopdecrypter_new_004.png&quot;&gt;&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=400&amp;amp;tok=083297&amp;amp;media=stopdecrypter_new_004.png&quot; class=&quot;media&quot; alt=&quot;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; STOPDecrypter will display a message asking your if you have read &lt;a href=&quot;https://www.bleepingcomputer.com/forums/t/671473/stop-ransomware-stop-puma-djvu-promo-drume-support-topic/page-50#entry4682102&quot; class=&quot;urlextern&quot; title=&quot;https://www.bleepingcomputer.com/forums/t/671473/stop-ransomware-stop-puma-djvu-promo-drume-support-topic/page-50#entry4682102&quot; rel=&quot;ugc nofollow&quot;&gt;the FAQ&lt;/a&gt;. You must click &lt;strong&gt;Yes&lt;/strong&gt; in order to continue. Please read the message before clicking “Yes”.&lt;br/&gt;
&lt;a href=&quot;https://kb.gt500.org/lib/exe/fetch.php?media=stopdecrypter_new_005.png&quot; class=&quot;media&quot; title=&quot;stopdecrypter_new_005.png&quot;&gt;&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=300&amp;amp;tok=cc2d43&amp;amp;media=stopdecrypter_new_005.png&quot; class=&quot;media&quot; alt=&quot;&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; STOPDecrypter will now open, and will show your ID&amp;#039;s and MAC addresses in the box on the left.&lt;br/&gt;
&lt;a href=&quot;https://kb.gt500.org/lib/exe/fetch.php?media=stopdecrypter_new_006.png&quot; class=&quot;media&quot; title=&quot;stopdecrypter_new_006.png&quot;&gt;&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=400&amp;amp;tok=86028c&amp;amp;media=stopdecrypter_new_006.png&quot; class=&quot;media&quot; alt=&quot;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Please copy this information, and paste it into a reply to the forum post or e-mail where you were asked to follow these instructions. Alternately you can leave the information in a reply to the STOP ransomware help thread on the BleepingComputer forums at &lt;a href=&quot;https://www.bleepingcomputer.com/forums/t/671473/stop-ransomware-stop-puma-djvu-promo-drume-support-topic/&quot; class=&quot;urlextern&quot; title=&quot;https://www.bleepingcomputer.com/forums/t/671473/stop-ransomware-stop-puma-djvu-promo-drume-support-topic/&quot; rel=&quot;ugc nofollow&quot;&gt;this link&lt;/a&gt;.&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;
Once your ID and MAC address have been posted, it can be forwarded to the creator of STOPDecrypter, or if it was posted in the BleepingComputer STOP ransomware help thread then he should find it himself and archive it. If he is able to figure out your decryption key, then you should be contacted with information on how to decrypt your files.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Getting Your ID and MAC With STOPDecrypter&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;getting_your_id_and_mac_with_stopdecrypter&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;351-&amp;quot;} --&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Sun, 13 Dec 2020 03:27:49 +0000</pubDate>
        </item>
        <item>
            <title>prevention</title>
            <link>https://kb.gt500.org/doku.php?id=prevention&amp;rev=1607847903&amp;do=diff</link>
            <description>&lt;div class=&quot;plugin_note noteimportant&quot;&gt;This article was never finished, and is at least a decade out of date. I&amp;#039;ll try to update it when I can, however I can&amp;#039;t guarantee I will be able to find the time.
&lt;/div&gt;
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;keeping_your_computer_clean&quot;&gt;Keeping Your Computer Clean&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
In this day of evasive malware that can easily prevent your security applications from running and protecting you, it is even more important that you protect your computer from all of the nasty viruses, trojans, spyware, adware, rogues, etc. that are floating about on the Internet. This article will deal with several aspects of protecting your computer, including cleaning your computer up after getting infected.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Keeping Your Computer Clean&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;keeping_your_computer_clean&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;190-649&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;prevention&quot;&gt;1. Prevention&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Understanding how to prevent infection is very important. This section has two subsections: a. Software Methods, b. User Methods. Software Methods is about the best applications that help prevent infection, and the best way to set up your computer to help prevent infection. User Methods deals with how to browse the Internet in a safe way, as well as describing some of the more common methods of &lt;a href=&quot;http://en.wikipedia.org/wiki/Social_engineering_(security)&quot; class=&quot;urlextern&quot; title=&quot;http://en.wikipedia.org/wiki/Social_engineering_(security)&quot; rel=&quot;ugc nofollow&quot;&gt;social engineering&lt;/a&gt; and how you can avoid them.
&lt;/p&gt;

&lt;/div&gt;

&lt;h4 id=&quot;a_software_methods&quot;&gt;a. Software Methods&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
It is important to have a good &lt;a href=&quot;http://en.wikipedia.org/wiki/Computer_software&quot; class=&quot;urlextern&quot; title=&quot;http://en.wikipedia.org/wiki/Computer_software&quot; rel=&quot;ugc nofollow&quot;&gt;software&lt;/a&gt; setup. This includes good anti-virus and anti-malware applications running their real-time protection, but it also includes making sure that you have a secure web browser and that you keep your computer up to date.
&lt;/p&gt;

&lt;/div&gt;

&lt;h5 id=&quot;i_anti-virus&quot;&gt;I. Anti-Virus:&lt;/h5&gt;
&lt;div class=&quot;level5&quot;&gt;

&lt;p&gt;
First we will concentrate on real-time security. This is things like your anti-virus that is protecting your computer. A lot of us have heard about Norton and McAfee, because they pay a lot of money to get manufacturers to install their software on new computers. The fact is that neither of these are good security applications, and they should never be used. Below is a list of anti-virus software that are far superior:
&lt;/p&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.free-av.com/&quot; class=&quot;urlextern&quot; title=&quot;http://www.free-av.com/&quot; rel=&quot;ugc nofollow&quot;&gt;AntiVir&lt;/a&gt; (free with ad, premium version available)&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.microsoft.com/security_essentials/&quot; class=&quot;urlextern&quot; title=&quot;http://www.microsoft.com/security_essentials/&quot; rel=&quot;ugc nofollow&quot;&gt;Microsoft Security Essentials&lt;/a&gt; (free)&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.eset.com/products/nod32.php&quot; class=&quot;urlextern&quot; title=&quot;http://www.eset.com/products/nod32.php&quot; rel=&quot;ugc nofollow&quot;&gt;NOD32&lt;/a&gt; (costs $59.99 USD for 1 year)&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.kaspersky.com/&quot; class=&quot;urlextern&quot; title=&quot;http://www.kaspersky.com/&quot; rel=&quot;ugc nofollow&quot;&gt;Kaspersky&lt;/a&gt; (stand-alone anti-virus costs $59.95 USD for 1 year)&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/div&gt;

&lt;h5 id=&quot;ii_anti-malware&quot;&gt;II. Anti-Malware:&lt;/h5&gt;
&lt;div class=&quot;level5&quot;&gt;

&lt;p&gt;
Having a good anti-virus is not enough. You will also need a good anti-malware or anti-spyware software with real-time protection. These types of applications will go above and beyond anti-virus software, concentrating on the types of things that anti-virus software is the most likely to miss. Here is a list of recommended software:
&lt;/p&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.malwarebytes.org/mbam.php&quot; class=&quot;urlextern&quot; title=&quot;http://www.malwarebytes.org/mbam.php&quot; rel=&quot;ugc nofollow&quot;&gt;Malwarebytes&amp;#039; Anti-Malware&lt;/a&gt; (real-time protection costs $24.95 USD for life)&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/div&gt;

&lt;h5 id=&quot;iii_hosts_file&quot;&gt;III. HOSTS File:&lt;/h5&gt;
&lt;div class=&quot;level5&quot;&gt;

&lt;p&gt;
Even with a good anti-malware/anti-spyware and a good anti-virus both running real-time protection, there is still more that can be done to block malicious content on the Internet. There is a file on every computer, called a HOSTS file, which can be used to silently block &lt;code&gt;known&lt;/code&gt; malicious websites. Obviously it does not block unknown malicious websites, but it does add an extra layer of protection. Unfortunately playing around with the HOSTS file, and especially keeping it updated, is a little more than the average person would want to do. Fortunately there are security experts and programmers out there that made some nice free utilities that can do it for you. Here is a list of applications that be used to apply HOSTS files from either hpHosts or MVPS:
&lt;/p&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.abelhadigital.com/&quot; class=&quot;urlextern&quot; title=&quot;http://www.abelhadigital.com/&quot; rel=&quot;ugc nofollow&quot;&gt;HostsMan&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.funkytoad.com/index.php?option=com_content&amp;amp;view=article&amp;amp;id=13&amp;amp;Itemid=31&quot; class=&quot;urlextern&quot; title=&quot;http://www.funkytoad.com/index.php?option=com_content&amp;amp;view=article&amp;amp;id=13&amp;amp;Itemid=31&quot; rel=&quot;ugc nofollow&quot;&gt;HostsXpert&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/div&gt;

&lt;h5 id=&quot;iv_browsers&quot;&gt;IV. Browsers:&lt;/h5&gt;
&lt;div class=&quot;level5&quot;&gt;

&lt;p&gt;
On top of those layers of security, understand that there are other aspects of security that are important. Most of us are browsing around the Internet with a web browser that has the &lt;code&gt;worst security record in the industry&lt;/code&gt;. Yes, I am talking about the Internet Explorer that came on your computer. The seemingly-harmless little blue &amp;#039;e&amp;#039; that takes you to all of your favorite websites. So what could be better than the only web browser that Microsoft gave you when you first started up your computer? Here is a list of some popular alternatives that are far more secure:
&lt;/p&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.opera.com/browser/&quot; class=&quot;urlextern&quot; title=&quot;http://www.opera.com/browser/&quot; rel=&quot;ugc nofollow&quot;&gt;Opera&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.srware.net/en/software_srware_iron.php&quot; class=&quot;urlextern&quot; title=&quot;http://www.srware.net/en/software_srware_iron.php&quot; rel=&quot;ugc nofollow&quot;&gt;SRWare Iron&lt;/a&gt; (based on Google&amp;#039;s Chrome, but doesn&amp;#039;t invade your privacy)&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.google.com/chrome&quot; class=&quot;urlextern&quot; title=&quot;http://www.google.com/chrome&quot; rel=&quot;ugc nofollow&quot;&gt;Google Chrome&lt;/a&gt; (same as SRWare Iron, except with mildly privacy-invading features)&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.mozilla.com/&quot; class=&quot;urlextern&quot; title=&quot;http://www.mozilla.com/&quot; rel=&quot;ugc nofollow&quot;&gt;Firefox&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.flock.com/&quot; class=&quot;urlextern&quot; title=&quot;http://www.flock.com/&quot; rel=&quot;ugc nofollow&quot;&gt;Flock&lt;/a&gt; (Firefox-based browser with social-networking features)&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/div&gt;

&lt;h5 id=&quot;v_updates&quot;&gt;V. Updates:&lt;/h5&gt;
&lt;div class=&quot;level5&quot;&gt;

&lt;p&gt;
It is very important to keep your software updated. Not just Windows, but also the various applications you use on a daily basis, such as; your web browser, your plugins and extensions for your web browser, your instant messaging clients, your e-mail client, your office suite, and of course any and all security software that you have.
&lt;/p&gt;

&lt;p&gt;
Most of these applications have update notifications of some sort. For instance, OpenOffice.org will tell you that a new update is available, and ask you if you want to download it. Both Opera and Firefox will download and install updates automatically (with advanced settings to tweak how they do it). But when it comes to Microsoft applications, such as Microsoft Office (which contains Word, Excel, PowerPoint, Outlook, etc.) you need to take an extra step before you will automatically receive updates for them, even if you have Windows Update set to automatic. This extra step is called Microsoft Update, and it must be installed and activated to automatically receive updates to Microsoft products other than Windows itself.
&lt;/p&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.microsoft.com/security/updates/mu.aspx&quot; class=&quot;urlextern&quot; title=&quot;http://www.microsoft.com/security/updates/mu.aspx&quot; rel=&quot;ugc nofollow&quot;&gt;Learn More About Microsoft Update&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
In addition to making sure that you are getting all of the updates for all of the Microsoft applications that you use, you need to make sure that you are getting all of the updates for things like Java, Adobe Flash, and Adobe Reader. &lt;em&gt;I cannot stress how important it is to keep these plugins up to date to help avoid infection.&lt;/em&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.java.com/&quot; class=&quot;urlextern&quot; title=&quot;http://www.java.com/&quot; rel=&quot;ugc nofollow&quot;&gt;Java&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://get.adobe.com/flashplayer/&quot; class=&quot;urlextern&quot; title=&quot;http://get.adobe.com/flashplayer/&quot; rel=&quot;ugc nofollow&quot;&gt;Adobe Flash Player&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://get.adobe.com/reader/&quot; class=&quot;urlextern&quot; title=&quot;http://get.adobe.com/reader/&quot; rel=&quot;ugc nofollow&quot;&gt;Adobe Reader&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
If you are not sure what applications on your computer require updates, then here are a couple of resources that are invaluable:
&lt;/p&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://secunia.com/software_inspector&quot; class=&quot;urlextern&quot; title=&quot;http://secunia.com/software_inspector&quot; rel=&quot;ugc nofollow&quot;&gt;Secunia Software Inspector&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.dozleng.com/updates/index.php?act=calendar&quot; class=&quot;urlextern&quot; title=&quot;http://www.dozleng.com/updates/index.php?act=calendar&quot; rel=&quot;ugc nofollow&quot;&gt;Calendar of Updates&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/div&gt;

&lt;h5 id=&quot;vi_autorun&quot;&gt;VI. Autorun:&lt;/h5&gt;
&lt;div class=&quot;level5&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.f-secure.com/weblog/archives/00001575.html&quot; class=&quot;urlextern&quot; title=&quot;http://www.f-secure.com/weblog/archives/00001575.html&quot; rel=&quot;ugc nofollow&quot;&gt;Autorun&lt;/a&gt; is that nifty little feature in Windows where, when you put a CD in the drive or plug a Flash drive into a USB port, Windows will look for a driver file that tells it what application to automatically run, and if none is found it gives you a list of options. At first such a feature seems like a great convenience, because now we never have to go looking through “My Computer” when we want to find the files on something we just plugged in.
&lt;/p&gt;

&lt;p&gt;
Sadly, this convenience &lt;a href=&quot;http://miekiemoes.blogspot.com/2008/11/please-disable-autorun-asap.html&quot; class=&quot;urlextern&quot; title=&quot;http://miekiemoes.blogspot.com/2008/11/please-disable-autorun-asap.html&quot; rel=&quot;ugc nofollow&quot;&gt;comes with a heavy price&lt;/a&gt;. When you plug a flash drive into an infected computer, many viruses/trojans/etc. will copy a couple of files to that flash drive. One of the files is a tiny application with a single purpose, which is to infect any computer that the flash drive is plugged into. The other file is a driver that tells Windows to load the malicious application when you plug in the flash drive.
&lt;/p&gt;

&lt;p&gt;
So, what can you do to guard yourself from this? The best course of action is to disable autorun. Here are several tutorials on how to do this:
&lt;/p&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.howtogeek.com/howto/windows/disable-autoplay-of-audio-cds-and-usb-drives/&quot; class=&quot;urlextern&quot; title=&quot;http://www.howtogeek.com/howto/windows/disable-autoplay-of-audio-cds-and-usb-drives/&quot; rel=&quot;ugc nofollow&quot;&gt;Disable Autorun on Windows XP Professional&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.engadget.com/2004/06/29/how-to-tuesday-disable-autorun-on-windows/&quot; class=&quot;urlextern&quot; title=&quot;http://www.engadget.com/2004/06/29/how-to-tuesday-disable-autorun-on-windows/&quot; rel=&quot;ugc nofollow&quot;&gt;Disable Autorun on Windows XP Home&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.howtogeek.com/howto/windows-vista/disable-autoplay-in-windows-vista/&quot; class=&quot;urlextern&quot; title=&quot;http://www.howtogeek.com/howto/windows-vista/disable-autoplay-in-windows-vista/&quot; rel=&quot;ugc nofollow&quot;&gt;Disable Autorun on Windows Vista&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/div&gt;

&lt;h5 id=&quot;vii_peer-2-peer&quot;&gt;VII. Peer-2-Peer:&lt;/h5&gt;
&lt;div class=&quot;level5&quot;&gt;

&lt;p&gt;
Peer-2-Peer (P2P) networking is a very common way to share files, and more than that it is the biggest way to pirate music and video on the Internet. Unfortunately, it is also one of the easiest ways for viruses and other malware to spread on the Internet. Many P2P applications (such as Limewire/Frostwire) will even automatically start sharing all of your private files without your knowledge, which means you lose all privacy on your own computer, and you could unknowingly become a participant in not only music and media piracy but software piracy as well. Worse than that is the fact that they usually install startup items on your computer, which means that whenever your computer is on it is sharing your files, and any files that you have downloaded through these P2P networks.
&lt;/p&gt;

&lt;p&gt;
OK, so maybe you don&amp;#039;t care that you are sharing your private files all of the time, or that some (if not all) of the content you are sharing is being shared illegally. Even if that is the case, you have to remember that there are other people using these filesharing networks who do not understand this. This sets up a case where viruses, like &lt;a href=&quot;http://miekiemoes.blogspot.com/2009/02/virut-and-other-file-infectors-throwing.html&quot; class=&quot;urlextern&quot; title=&quot;http://miekiemoes.blogspot.com/2009/02/virut-and-other-file-infectors-throwing.html&quot; rel=&quot;ugc nofollow&quot;&gt;virut&lt;/a&gt;, can easily infect any executables or screensavers that a person is sharing, and often an anti-virus cannot tell that something malicious has been injected into a legitimate application or they are unable to repair the infected application without deleting it (otherwise file injectors like virut would not be an issue). When you take this into consideration, you have to assume that most applications and screensavers you download from P2P networks like Limewire are already infected.
&lt;/p&gt;

&lt;p&gt;
Is there never a need for P2P filesharing? That depends on which network. When it comes to the networks used by things like Limewire, there are really no good reasons to be using them. When it comes to something like BitTorrent, then it&amp;#039;s not as bad. For instance, most Linux distributions are available via BitTorrent. There are people who make free movies and distribute them via BitTorrent. There are Churches that distribute DVD-quality sermons through BitTorrent. The list of good uses is not endless, but it&amp;#039;s much larger than some might think. The problem is that while you are using BitTorrent for good things, there could always be people sharing parts of the file who are sending you bad/corrupt data, or any number of other dastardly things. It is important to protect yourself from these things, and while the IP Blocking in Malwarebytes&amp;#039; Anti-Malware will block some of it, it does not go far enough for simple P2P protection. You need more than that:
&lt;/p&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.peerblock.com/&quot; class=&quot;urlextern&quot; title=&quot;http://www.peerblock.com/&quot; rel=&quot;ugc nofollow&quot;&gt;PeerBlock 2&lt;/a&gt; (note that there could be issues with this and other IP Blocking techniques running at the same time)&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/div&gt;

&lt;h4 id=&quot;b_user_methods&quot;&gt;b. User Methods&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
More important than security software is the knowledge that a user (that would be anyone using a computer, aka: you) has about threats on the Internet. In this section we will attempt to cover the most common ways that malicious software gets on your computer - aka: tricking you into thinking that it&amp;#039;s something you want.
&lt;/p&gt;

&lt;/div&gt;

&lt;h5 id=&quot;i_download_this_codec&quot;&gt;I. Download This Codec:&lt;/h5&gt;
&lt;div class=&quot;level5&quot;&gt;

&lt;p&gt;
One of the most popular ways of tricking someone into believing that they want something malicious is to convince them that it is something they need to watch a video that they are interested in. Most people just assume that a video will play when you visit a site with a video, but what they don&amp;#039;t realize is that when a video is loaded that two things are needed for it to play:
&lt;/p&gt;
&lt;ol&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; The appropriate plugin for the web browser.&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; A codec that describes how to decode and play the video.&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;
Now, when you go to YouTube, and sites like it, the videos play through a plugin called Flash (which is currently made by Adobe). As long as you have the Flash plugin, which Microsoft distributes with Internet Explorer and keeps updated via Windows Update, then you are able to play videos on sites such as YouTube. When you are poking around on the Internet, sometimes you will come across videos that do not use Flash, but instead use other plugins. These normally play through Windows Media Player, but if Windows Media Player does not have the codec that describes that type of video, then you will receive an error. Some malicious websites will take advantage of the confusion surrounding codecs, and trick people into installing something malicious by showing them a webpage that looks like it has an interesting video on it, and then telling them that they need to download a codec for a video to play. This is the point at which you should close your web browser as fast as you can, and manually update all of your security software in order to run scans of your computer.
&lt;/p&gt;

&lt;p&gt;
A good rule of thumb is to never click on a link to a video on some random website that you are not familiar with. Places like YouTube, DailyMotion, Google Video, Yahoo! Video, etc. are OK, but unless you are familiar with the site, or know people who use it without strange computer problems, then probably best to stay away from it.
&lt;/p&gt;

&lt;/div&gt;

&lt;h5 id=&quot;ii_your_computer_is_infected&quot;&gt;II. Your Computer Is Infected:&lt;/h5&gt;
&lt;div class=&quot;level5&quot;&gt;

&lt;p&gt;
Every now and then, as your are browsing around the Internet, you will get a seemingly random popup that looks like an anti-virus scan telling you that your computer is infected and asking you to click to take some sort of action to remedy the situation. Many times the popup will not look anything like your anti-virus software, but will try to look like it is some sort of official Windows popup to trick you into thinking that it is legitimate. Many times they will even use official looking Microsoft graphics to make them look legitimate, such as the following screenshot (complements of the &lt;a href=&quot;http://siri-urz.blogspot.com/&quot; class=&quot;urlextern&quot; title=&quot;http://siri-urz.blogspot.com/&quot; rel=&quot;ugc nofollow&quot;&gt;S!Ri.URZ Blog&lt;/a&gt;):
&lt;/p&gt;

&lt;p&gt;
&lt;a href=&quot;https://kb.gt500.org/lib/exe/fetch.php?tok=900fc9&amp;amp;media=https%3A%2F%2Flh3.googleusercontent.com%2F_B8nwWVzH9zc%2FTWI0Rc7nxkI%2FAAAAAAAACAI%2FNIS4YV--fyY%2FInternetSecurityEssentials.GUI.png&quot; class=&quot;media&quot; title=&quot;https://lh3.googleusercontent.com/_B8nwWVzH9zc/TWI0Rc7nxkI/AAAAAAAACAI/NIS4YV--fyY/InternetSecurityEssentials.GUI.png&quot;&gt;&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=478&amp;amp;tok=0c8cb3&amp;amp;media=https%3A%2F%2Flh3.googleusercontent.com%2F_B8nwWVzH9zc%2FTWI0Rc7nxkI%2FAAAAAAAACAI%2FNIS4YV--fyY%2FInternetSecurityEssentials.GUI.png&quot; class=&quot;media&quot; alt=&quot;&quot; width=&quot;478&quot; /&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
If you see something like this, then the best course of action is to close your Internet browser immediately, and run an anti-malware scan (make sure to update your anti-malware tool before running the scan). Many times these things will attempt to use security vulnerabilities in popular Internet browsers (especially Internet Explorer) to cause a trojan to run on your computer, which will install a rogue and a rootkit to prevent you from removing it. It can do this in a matter of seconds, however if you catch it quickly enough, then you may be able to remove the trojan before it installs a rootkit.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;1. Prevention&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;prevention&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;650-14853&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;removal&quot;&gt;2. Removal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Prevention is bound to fail every now and then. No matter how safely you browse the Internet, and no matter how many levels of security you have, your computer can still get infected.
&lt;/p&gt;

&lt;p&gt;
The most obvious reason for this is that, even the most educated person can still make a mistake. Even experts will sometimes accidentally click on a link that they shouldn&amp;#039;t have.
&lt;/p&gt;

&lt;p&gt;
The other main reason is because anti-virus software detects viruses and malware based on whether or not it&amp;#039;s been seen before. If something new comes out, it often takes a few days (if not weeks) for the security industry to catch up. Yes, most security applications have what are called heuristics, which are supposed to detect new variants of viruses and such without the need for them to have been seen before, but even in an application with as good of heuristics as Malwarebytes&amp;#039; Anti-Malware the research team who maintains the database has to have come in contact with something before they can write heuristics that catch it.
&lt;/p&gt;

&lt;/div&gt;

&lt;h4 id=&quot;a_automated_removal&quot;&gt;a. Automated Removal&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
Automated removal tools are plentiful these days, and there are a lot of rogues out there that are posing as popular removal tools just to steal your money (Malware Removal BOT, AntiMalware Pro, and MalwareBot Malware Remover are just a few of many). It is important that you make sure the get legitimate tools from legitimate download sites.
&lt;/p&gt;

&lt;p&gt;
Some good malware/spyware removal tools include the following:
&lt;/p&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.malwarebytes.org/mbam.php&quot; class=&quot;urlextern&quot; title=&quot;http://www.malwarebytes.org/mbam.php&quot; rel=&quot;ugc nofollow&quot;&gt;Malwarebytes&amp;#039; Anti-Malware&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.safer-networking.org/en/spybotsd/index.html&quot; class=&quot;urlextern&quot; title=&quot;http://www.safer-networking.org/en/spybotsd/index.html&quot; rel=&quot;ugc nofollow&quot;&gt;Spybot Search &amp;amp; Destroy&lt;/a&gt; (I highly recommend that you &lt;em&gt;do not&lt;/em&gt; allow it to install its “TeaTimer” component)&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.superantispyware.com/&quot; class=&quot;urlextern&quot; title=&quot;http://www.superantispyware.com/&quot; rel=&quot;ugc nofollow&quot;&gt;SUPERAntiSpyware&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
Also, most anti-virus software vendors have special tools designed to remove viruses. They will often be offered as one tool to remove all variants of a single virus, and so if you have multiple viruses you may need to download multiple tools. Here is a list of links to some of these tools from some anti-virus vendors:
&lt;/p&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.microsoft.com/security/pc-security/malware-removal.aspx&quot; class=&quot;urlextern&quot; title=&quot;http://www.microsoft.com/security/pc-security/malware-removal.aspx&quot; rel=&quot;ugc nofollow&quot;&gt;Microsoft&amp;#039;s Malicious Software Removal Tool&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.avira.com/en/support-download-avira-antivir-removal-tool&quot; class=&quot;urlextern&quot; title=&quot;http://www.avira.com/en/support-download-avira-antivir-removal-tool&quot; rel=&quot;ugc nofollow&quot;&gt;Avira AntiVir Removal Tool&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.eset.com/download/free-antivirus-utilities&quot; class=&quot;urlextern&quot; title=&quot;http://www.eset.com/download/free-antivirus-utilities&quot; rel=&quot;ugc nofollow&quot;&gt;ESET Spyware Removal and Antivirus Tools and ESET Online Scanner&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.kaspersky.com/virus-removal-tools&quot; class=&quot;urlextern&quot; title=&quot;http://www.kaspersky.com/virus-removal-tools&quot; rel=&quot;ugc nofollow&quot;&gt;Kaspersky Virus Removal Tools&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.bitdefender.com/site/Downloads/browseFreeRemovalTool/&quot; class=&quot;urlextern&quot; title=&quot;http://www.bitdefender.com/site/Downloads/browseFreeRemovalTool/&quot; rel=&quot;ugc nofollow&quot;&gt;BitDefender Free Virus Removal Tools&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.sophos.com/support/disinfection/&quot; class=&quot;urlextern&quot; title=&quot;http://www.sophos.com/support/disinfection/&quot; rel=&quot;ugc nofollow&quot;&gt;Sophos Virus Removal Instructions and Tools&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;
Sometimes rootkits can prevent removal of common infections, and rootkits such as TDSS, TDL3, and TDL4 can be very difficult to disable and remove without a Windows CD or some other way of repairing your computer&amp;#039;s boot sector from a bootable CD or DVD. Kaspersky&amp;#039;s TDSSKiller can often remove these rootkits on its own, however we highly recommend that you seek assistance from an expert in malware removal for instructions on how to proceed if you believe that your computer is infected with the TDSS, TDL3, or TDL4 rootkits as tools like Kaspersky&amp;#039;s TDSSKiller can be dangerous if you run them without expert assistance/instructions.
&lt;/p&gt;

&lt;/div&gt;

&lt;h4 id=&quot;b_manual_removal&quot;&gt;b. Manual Removal&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
Since automated tools cannot possibly remove everything, there are various online security communities that have forums where trained experts will be able to assist you with manually removing infections from your computer. Here are a list of some of those forums:
&lt;/p&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://forums.malwarebytes.org/&quot; class=&quot;urlextern&quot; title=&quot;http://forums.malwarebytes.org/&quot; rel=&quot;ugc nofollow&quot;&gt;Malwarebytes Forums&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.bleepingcomputer.com/&quot; class=&quot;urlextern&quot; title=&quot;http://www.bleepingcomputer.com/&quot; rel=&quot;ugc nofollow&quot;&gt;BleepingComputer&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.geekstogo.com/&quot; class=&quot;urlextern&quot; title=&quot;http://www.geekstogo.com/&quot; rel=&quot;ugc nofollow&quot;&gt;GeeksToGo&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.whatthetech.com/&quot; class=&quot;urlextern&quot; title=&quot;http://www.whatthetech.com/&quot; rel=&quot;ugc nofollow&quot;&gt;What the Tech?&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.malwareremoval.com/&quot; class=&quot;urlextern&quot; title=&quot;http://www.malwareremoval.com/&quot; rel=&quot;ugc nofollow&quot;&gt;Malware Removal&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.techsupportforum.com/&quot; class=&quot;urlextern&quot; title=&quot;http://www.techsupportforum.com/&quot; rel=&quot;ugc nofollow&quot;&gt;Tech Support Forum&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.spywareinfoforum.com/&quot; class=&quot;urlextern&quot; title=&quot;http://www.spywareinfoforum.com/&quot; rel=&quot;ugc nofollow&quot;&gt;SpywareInfo Forum&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.spywarehammer.com/&quot; class=&quot;urlextern&quot; title=&quot;http://www.spywarehammer.com/&quot; rel=&quot;ugc nofollow&quot;&gt;SpywareHammer&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.gt500.org/forums/&quot; class=&quot;urlextern&quot; title=&quot;http://www.gt500.org/forums/&quot; rel=&quot;ugc nofollow&quot;&gt;GT500.org Forums&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;2. Removal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;removal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;14854-19022&amp;quot;} --&gt;
&lt;h1 class=&quot;sectionedit4&quot; id=&quot;creditsacknowledgments&quot;&gt;Credits/Acknowledgments&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
Some of the content in this article was added or changed at the suggestions of the following contributors:
&lt;/p&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.malwarebytes.org/forums/index.php?showuser=2065&quot; class=&quot;urlextern&quot; title=&quot;http://www.malwarebytes.org/forums/index.php?showuser=2065&quot; rel=&quot;ugc nofollow&quot;&gt;Ron Lewis&lt;/a&gt; (Manager of Online Support - Malwarebytes Corporation)&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.malwarebytes.org/forums/index.php?showuser=2103&quot; class=&quot;urlextern&quot; title=&quot;http://www.malwarebytes.org/forums/index.php?showuser=2103&quot; rel=&quot;ugc nofollow&quot;&gt;Samuel E Lindsey&lt;/a&gt; (Malwarebytes Quality Assurance)&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.malwarebytes.org/forums/index.php?showuser=4415&quot; class=&quot;urlextern&quot; title=&quot;http://www.malwarebytes.org/forums/index.php?showuser=4415&quot; rel=&quot;ugc nofollow&quot;&gt;extremeboy&lt;/a&gt; (volunteer expert at Malwarebytes.org)&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;http://www.malwarebytes.org/forums/index.php?showuser=1009&quot; class=&quot;urlextern&quot; title=&quot;http://www.malwarebytes.org/forums/index.php?showuser=1009&quot; rel=&quot;ugc nofollow&quot;&gt;Steven Burn&lt;/a&gt; (Malwarebytes Researcher, hpHosts maintainer, etc)&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Credits\/Acknowledgments&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;creditsacknowledgments&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:4,&amp;quot;range&amp;quot;:&amp;quot;19023-&amp;quot;} --&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Sun, 13 Dec 2020 03:25:03 +0000</pubDate>
        </item>
        <item>
            <title>start</title>
            <link>https://kb.gt500.org/doku.php?id=start&amp;rev=1607847827&amp;do=diff</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;welcome_to_the_gt500org_knowledgebase&quot;&gt;Welcome to the GT500.org Knowledgebase&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
The purpose of this wiki is to provide a place for computer and security related articles, tutorials, etc. Here are links to the ones that have been published thus far:
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Welcome to the GT500.org Knowledgebase&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;welcome_to_the_gt500org_knowledgebase&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-225&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;toolsutilities&quot;&gt;Tools/Utilities&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;https://kb.gt500.org/doku.php?id=tdsskiller_log&quot; class=&quot;wikilink1&quot; title=&quot;tdsskiller_log&quot; data-wiki-id=&quot;tdsskiller_log&quot;&gt;TDSSKiller Log&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;https://kb.gt500.org/doku.php?id=stopdecrypter&quot; class=&quot;wikilink1&quot; title=&quot;stopdecrypter&quot; data-wiki-id=&quot;stopdecrypter&quot;&gt;STOPDecrypter&lt;/a&gt; - Getting your ID and MAC for decryption support.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Tools\/Utilities&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;toolsutilities&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;226-351&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;security&quot;&gt;Security&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;a href=&quot;https://kb.gt500.org/doku.php?id=prevention&quot; class=&quot;wikilink1&quot; title=&quot;prevention&quot; data-wiki-id=&quot;prevention&quot;&gt;Prevention&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Security&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;security&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;352-&amp;quot;} --&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Sun, 13 Dec 2020 03:23:47 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_djvu_key - created</title>
            <link>https://kb.gt500.org/doku.php?id=stopdecrypter_djvu_key&amp;rev=1560461630&amp;do=diff</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;adding_a_djvu_key_to_stopdecrypter&quot;&gt;Adding a Djvu Key to STOPDecrypter&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;br/&gt;

&lt;/p&gt;
&lt;div class=&quot;plugin_note notewarning&quot;&gt;&lt;strong&gt;Do not attempt to follow these instructions unless you have been asked to do so.&lt;/strong&gt; If you have not been given a key by the creator of STOPDecrypter (Demonslay335), then following these instructions &lt;em&gt;will&lt;/em&gt; result in corrupted files (they will look normal, but they won&amp;#039;t work).
&lt;/div&gt;
&lt;p&gt;
These instructions assume that you already know how to download and open STOPDecrypter. If you do not, then you may download it from &lt;a href=&quot;https://download.bleepingcomputer.com/demonslay335/STOPDecrypter.zip&quot; class=&quot;urlextern&quot; title=&quot;https://download.bleepingcomputer.com/demonslay335/STOPDecrypter.zip&quot; rel=&quot;ugc nofollow&quot;&gt;this link&lt;/a&gt;, and you may follow steps #1 through #6 in our &lt;a href=&quot;https://kb.gt500.org/doku.php?id=stopdecrypter&quot; class=&quot;wikilink1&quot; title=&quot;stopdecrypter&quot; data-wiki-id=&quot;stopdecrypter&quot;&gt;STOPDecrypter article&lt;/a&gt; (please ignore everything after step #6 in that article).
&lt;/p&gt;

&lt;p&gt;
Most of the steps below contain pictures to help see what you&amp;#039;re supposed to do. Please do not try to use the ID and Password seen in these pictures, as they are only an example, and won&amp;#039;t work for you.&lt;br/&gt;
&lt;br/&gt;

&lt;/p&gt;
&lt;ol&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Open STOPDecrypter, and affirm that you have read the &lt;abbr title=&quot;Frequently Asked Questions&quot;&gt;FAQ&lt;/abbr&gt; available &lt;a href=&quot;https://www.bleepingcomputer.com/forums/t/671473/stop-ransomware-stop-puma-djvu-promo-drume-support-topic/page-50#entry4682102&quot; class=&quot;urlextern&quot; title=&quot;https://www.bleepingcomputer.com/forums/t/671473/stop-ransomware-stop-puma-djvu-promo-drume-support-topic/page-50#entry4682102&quot; rel=&quot;ugc nofollow&quot;&gt;here&lt;/a&gt;.&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Click on &lt;strong&gt;Tools&lt;/strong&gt;.&lt;br/&gt;
&lt;a href=&quot;https://kb.gt500.org/lib/exe/fetch.php?media=stopdecrypter_djvu_key_001.png&quot; class=&quot;media&quot; title=&quot;stopdecrypter_djvu_key_001.png&quot;&gt;&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=400&amp;amp;tok=a9f12d&amp;amp;media=stopdecrypter_djvu_key_001.png&quot; class=&quot;media&quot; alt=&quot;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Click on &lt;strong&gt;Add Djvu Key&lt;/strong&gt;.&lt;br/&gt;
&lt;a href=&quot;https://kb.gt500.org/lib/exe/fetch.php?media=stopdecrypter_djvu_key_002.png&quot; class=&quot;media&quot; title=&quot;stopdecrypter_djvu_key_002.png&quot;&gt;&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=400&amp;amp;tok=17d62b&amp;amp;media=stopdecrypter_djvu_key_002.png&quot; class=&quot;media&quot; alt=&quot;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Enter your ID and Password (sometimes called a “decryption key”), then click &lt;strong&gt;OK&lt;/strong&gt;.&lt;br/&gt;
Note: Your ID and Password will be different from what&amp;#039;s shown below.&lt;br/&gt;
&lt;a href=&quot;https://kb.gt500.org/lib/exe/fetch.php?media=stopdecrypter_djvu_key_003.png&quot; class=&quot;media&quot; title=&quot;stopdecrypter_djvu_key_003.png&quot;&gt;&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=300&amp;amp;tok=c92338&amp;amp;media=stopdecrypter_djvu_key_003.png&quot; class=&quot;media&quot; alt=&quot;&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Click on &lt;strong&gt;Select Directory&lt;/strong&gt;.&lt;br/&gt;
&lt;a href=&quot;https://kb.gt500.org/lib/exe/fetch.php?media=stopdecrypter_djvu_key_004.png&quot; class=&quot;media&quot; title=&quot;stopdecrypter_djvu_key_004.png&quot;&gt;&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=400&amp;amp;tok=d3b203&amp;amp;media=stopdecrypter_djvu_key_004.png&quot; class=&quot;media&quot; alt=&quot;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Either select a folder containing files you wish to decrypt, or select your profile folder.&lt;br/&gt;
The profile folder highlighted below is an example, and yours will be named after your account on the computer.&lt;br/&gt;
If you double-click on a folder in the list, it will open to show you any folders it contains.&lt;br/&gt;
&lt;a href=&quot;https://kb.gt500.org/lib/exe/fetch.php?media=stopdecrypter_djvu_key_005.png&quot; class=&quot;media&quot; title=&quot;stopdecrypter_djvu_key_005.png&quot;&gt;&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=200&amp;amp;tok=2c40b4&amp;amp;media=stopdecrypter_djvu_key_005.png&quot; class=&quot;media&quot; alt=&quot;&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Click on “Decrypt” to start decrypting your files. Any errors or other messages will appear in the log on the left side of the STOPDecrypter window.&lt;br/&gt;
&lt;a href=&quot;https://kb.gt500.org/lib/exe/fetch.php?media=stopdecrypter_djvu_key_006.png&quot; class=&quot;media&quot; title=&quot;stopdecrypter_djvu_key_006.png&quot;&gt;&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=400&amp;amp;tok=049ae2&amp;amp;media=stopdecrypter_djvu_key_006.png&quot; class=&quot;media&quot; alt=&quot;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;/div&gt;
</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Thu, 13 Jun 2019 17:33:50 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_djvu_key_006.png - created</title>
            <link>https://kb.gt500.org/doku.php?image=stopdecrypter_djvu_key_006.png&amp;ns=&amp;rev=1560460489&amp;tab_details=history&amp;mediado=diff&amp;do=media</link>
            <description>&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=500&amp;h=273&amp;t=1560460489&amp;amp;tok=43cca4&amp;amp;media=stopdecrypter_djvu_key_006.png&quot; alt=&quot;stopdecrypter_djvu_key_006.png&quot; /&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Thu, 13 Jun 2019 17:14:49 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_djvu_key_005.png - created</title>
            <link>https://kb.gt500.org/doku.php?image=stopdecrypter_djvu_key_005.png&amp;ns=&amp;rev=1560460489&amp;tab_details=history&amp;mediado=diff&amp;do=media</link>
            <description>&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=320&amp;h=320&amp;t=1560460489&amp;amp;tok=1b68de&amp;amp;media=stopdecrypter_djvu_key_005.png&quot; alt=&quot;stopdecrypter_djvu_key_005.png&quot; /&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Thu, 13 Jun 2019 17:14:49 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_djvu_key_004.png - created</title>
            <link>https://kb.gt500.org/doku.php?image=stopdecrypter_djvu_key_004.png&amp;ns=&amp;rev=1560460489&amp;tab_details=history&amp;mediado=diff&amp;do=media</link>
            <description>&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=500&amp;h=273&amp;t=1560460489&amp;amp;tok=ca9bc3&amp;amp;media=stopdecrypter_djvu_key_004.png&quot; alt=&quot;stopdecrypter_djvu_key_004.png&quot; /&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Thu, 13 Jun 2019 17:14:49 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_djvu_key_002.png - created</title>
            <link>https://kb.gt500.org/doku.php?image=stopdecrypter_djvu_key_002.png&amp;ns=&amp;rev=1560460489&amp;tab_details=history&amp;mediado=diff&amp;do=media</link>
            <description>&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=500&amp;h=273&amp;t=1560460489&amp;amp;tok=bc7c8c&amp;amp;media=stopdecrypter_djvu_key_002.png&quot; alt=&quot;stopdecrypter_djvu_key_002.png&quot; /&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Thu, 13 Jun 2019 17:14:49 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_djvu_key_003.png - created</title>
            <link>https://kb.gt500.org/doku.php?image=stopdecrypter_djvu_key_003.png&amp;ns=&amp;rev=1560460489&amp;tab_details=history&amp;mediado=diff&amp;do=media</link>
            <description>&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=354&amp;h=271&amp;t=1560460489&amp;amp;tok=8e2f7d&amp;amp;media=stopdecrypter_djvu_key_003.png&quot; alt=&quot;stopdecrypter_djvu_key_003.png&quot; /&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Thu, 13 Jun 2019 17:14:49 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_djvu_key_001.png - created</title>
            <link>https://kb.gt500.org/doku.php?image=stopdecrypter_djvu_key_001.png&amp;ns=&amp;rev=1560460489&amp;tab_details=history&amp;mediado=diff&amp;do=media</link>
            <description>&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=500&amp;h=273&amp;t=1560460489&amp;amp;tok=563082&amp;amp;media=stopdecrypter_djvu_key_001.png&quot; alt=&quot;stopdecrypter_djvu_key_001.png&quot; /&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Thu, 13 Jun 2019 17:14:49 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_new_006.png - created</title>
            <link>https://kb.gt500.org/doku.php?image=stopdecrypter_new_006.png&amp;ns=&amp;rev=1560223086&amp;tab_details=history&amp;mediado=diff&amp;do=media</link>
            <description>&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=500&amp;h=273&amp;t=1560223086&amp;amp;tok=f10351&amp;amp;media=stopdecrypter_new_006.png&quot; alt=&quot;stopdecrypter_new_006.png&quot; /&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Mon, 10 Jun 2019 23:18:06 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_new_005.png - created</title>
            <link>https://kb.gt500.org/doku.php?image=stopdecrypter_new_005.png&amp;ns=&amp;rev=1560223085&amp;tab_details=history&amp;mediado=diff&amp;do=media</link>
            <description>&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=397&amp;h=395&amp;t=1560223085&amp;amp;tok=00ff90&amp;amp;media=stopdecrypter_new_005.png&quot; alt=&quot;stopdecrypter_new_005.png&quot; /&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Mon, 10 Jun 2019 23:18:05 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_new_004.png - created</title>
            <link>https://kb.gt500.org/doku.php?image=stopdecrypter_new_004.png&amp;ns=&amp;rev=1560223085&amp;tab_details=history&amp;mediado=diff&amp;do=media</link>
            <description>&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=500&amp;h=374&amp;t=1560223085&amp;amp;tok=cfb672&amp;amp;media=stopdecrypter_new_004.png&quot; alt=&quot;stopdecrypter_new_004.png&quot; /&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Mon, 10 Jun 2019 23:18:05 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_new_002.png - created</title>
            <link>https://kb.gt500.org/doku.php?image=stopdecrypter_new_002.png&amp;ns=&amp;rev=1560223085&amp;tab_details=history&amp;mediado=diff&amp;do=media</link>
            <description>&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=316&amp;h=204&amp;t=1560223085&amp;amp;tok=872c1f&amp;amp;media=stopdecrypter_new_002.png&quot; alt=&quot;stopdecrypter_new_002.png&quot; /&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Mon, 10 Jun 2019 23:18:05 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_new_003.png - created</title>
            <link>https://kb.gt500.org/doku.php?image=stopdecrypter_new_003.png&amp;ns=&amp;rev=1560223085&amp;tab_details=history&amp;mediado=diff&amp;do=media</link>
            <description>&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=500&amp;h=369&amp;t=1560223085&amp;amp;tok=c53c4c&amp;amp;media=stopdecrypter_new_003.png&quot; alt=&quot;stopdecrypter_new_003.png&quot; /&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Mon, 10 Jun 2019 23:18:05 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_new_001.png - created</title>
            <link>https://kb.gt500.org/doku.php?image=stopdecrypter_new_001.png&amp;ns=&amp;rev=1560223085&amp;tab_details=history&amp;mediado=diff&amp;do=media</link>
            <description>&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=500&amp;h=374&amp;t=1560223085&amp;amp;tok=089931&amp;amp;media=stopdecrypter_new_001.png&quot; alt=&quot;stopdecrypter_new_001.png&quot; /&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Mon, 10 Jun 2019 23:18:05 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_005.png - created</title>
            <link>https://kb.gt500.org/doku.php?image=stopdecrypter_005.png&amp;ns=&amp;rev=1555369918&amp;tab_details=history&amp;mediado=diff&amp;do=media</link>
            <description>&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=500&amp;h=273&amp;t=1555369918&amp;amp;tok=33517c&amp;amp;media=stopdecrypter_005.png&quot; alt=&quot;stopdecrypter_005.png&quot; /&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Mon, 15 Apr 2019 19:11:58 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_004.png - created</title>
            <link>https://kb.gt500.org/doku.php?image=stopdecrypter_004.png&amp;ns=&amp;rev=1555369385&amp;tab_details=history&amp;mediado=diff&amp;do=media</link>
            <description>&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=500&amp;h=273&amp;t=1555369385&amp;amp;tok=d2b5c3&amp;amp;media=stopdecrypter_004.png&quot; alt=&quot;stopdecrypter_004.png&quot; /&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Mon, 15 Apr 2019 19:03:05 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_003.png - created</title>
            <link>https://kb.gt500.org/doku.php?image=stopdecrypter_003.png&amp;ns=&amp;rev=1555369165&amp;tab_details=history&amp;mediado=diff&amp;do=media</link>
            <description>&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=328&amp;h=392&amp;t=1555369165&amp;amp;tok=6b7805&amp;amp;media=stopdecrypter_003.png&quot; alt=&quot;stopdecrypter_003.png&quot; /&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Mon, 15 Apr 2019 18:59:25 +0000</pubDate>
        </item>
        <item>
            <title>stopdecrypter_002.png - created</title>
            <link>https://kb.gt500.org/doku.php?image=stopdecrypter_002.png&amp;ns=&amp;rev=1555368189&amp;tab_details=history&amp;mediado=diff&amp;do=media</link>
            <description>&lt;img src=&quot;https://kb.gt500.org/lib/exe/fetch.php?w=500&amp;h=273&amp;t=1555368189&amp;amp;tok=2636d7&amp;amp;media=stopdecrypter_002.png&quot; alt=&quot;stopdecrypter_002.png&quot; /&gt;</description>
            <author>gt500@undisclosed.example.com (gt500)</author>
            <pubDate>Mon, 15 Apr 2019 18:43:09 +0000</pubDate>
        </item>
    </channel>
</rss>
