The power of Gratitude – Thanksgiving Day (25 Nov 2015)

Gratitude is an immensely powerful force that we can use to expand our happiness, create loving relationships, and even improve our health.

If you want more happiness, joy, and energy, gratitude is clearly a crucial quality to cultivate. It is a fullness of heart that moves us from limitation and fear to expansion and love. When we’re appreciating something, our ego moves out of the way and we connect with our soul. Gratitude brings our attention into the present, which is the only place where miracles can unfold. The deeper our appreciation, the more we see with the eyes of the soul and the more our life flows in harmony with the creative power of the universe.

The Power of Gratitude And Why Thanksgiving Truly Matters. Science now shows just how much celebrating Thanksgiving and practicing gratitude can truly elevate our levels of happiness. Check out this infographic to see just how powerful gratitude can be.


Source: mindvalleyacademychopramindvalley

McAfee ePO Admin Interview Questions & Answers

Q.1  What is McAfee ePO ?

McAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry.

A single console for all your security management.

  • Get a unified view of your security posture with drag-and-drop dashboards that provide security intelligence across endpoints, data, mobile and networks.
  • Simplify security operations with streamlined workflows for proven efficiencies.
  • Flexible security management options allow you to select either a traditional premises-based or a cloud-based management version of McAfee ePO.
  • Leverage your existing third-party IT infrastructure from a single security management console with extensible architecture.

Q.2  Which is latest version of ePO?

The latest version of McAfee products

  •   ePolicy Orchestrator Ver 5.3.1
  •   Virus Scan Enterprise VSE 8.8 Patch 6
  •   McAfee Agent 5.0.1

To determine the ePO version number when you are logged on to ePO:

ePO 5.x: The version number is shown on the left pane of the Menu screen.

You can also determine the version by checking the version information contained within the server.ini file on the ePO server. You can open this file using Notepad.
The default location for the server.ini file is as follows:

…\Program Files\McAfee\ePolicy Orchestrator\DB

Q.3  What are the benefits of ePolicy Orchestrator Software?

ePolicy Orchestrator software is an extensible management platform that enables centralized policy management and enforcement of your security policies.

Using ePolicy Orchestrator software, you can perform these network security tasks:

  • Manage and enforce network security using policy assignments and client tasks.
  • Update the detection definition (DAT) files, anti-virus engines, and other security content required by your security software to ensure that your managed systems are secure.
  • Create reports, using the built-in query system wizard, that display informative user-configured charts and tables containing your network security data.

Q.4 Explain the Important Components of ePolicy Orchestrator Software and what they do ?

These components make up ePolicy Orchestrator software.

  • McAfee ePO server — The Center of your managed environment. The server delivers security policies and tasks, controls updates, and processes events for all managed systems.
  • Database — The central storage component for all data created and used by ePolicy Orchestrator. You can choose whether to house the database on your McAfee ePO server or on a separate system, depending on the specific needs of your organization.
  • McAfee Agent — A vehicle of information and enforcement between the McAfee ePO server and each managed system. The agent retrieves updates, ensures task implementation, enforces policies, and forwards events for each managed system. It uses a separate secure data channel to transfer data to the server. A McAfee Agent can also be configured as a SuperAgent.
  • Master repository — The central location for all McAfee updates and signatures, residing on the McAfee ePO server. The master repository retrieves user-specified updates and signatures from McAfee or from user-defined source sites.
  • Distributed repositories — Local access points strategically placed throughout your environment for agents to receive signatures, product updates, and product installations with minimal bandwidth impact. Depending on how your network is configured, you can set up SuperAgent, HTTP, FTP, or UNC share distributed repositories.
  • Remote Agent Handlers — A server that you can install in various network locations to help manage agent communication, load balancing, and product updates. Remote Agent Handlers are comprised of an Apache server and an event parser. They can help you manage the needs of large or complex network infrastructures by allowing you more control over agent-server communication.
  • Registered servers — Used to register other servers with your McAfee ePO server. Registered server types include:

LDAP server — Used for Policy Assignment Rules and to enable automatic user account creation.

SNMP server — Used to receive an SNMP trap. Add the SNMP server’s information so that ePolicy Orchestrator knows where to send the trap.

Database server — Used to extend the advanced reporting tools provided with ePolicy Orchestrator software.

Q.5  How the ePO software works ?

ePolicy Orchestrator software is designed to be extremely flexible. It can be set up in many different ways, to meet your unique needs.

The software follows the classic client-server model, in which a client system (system) calls into your server for instructions. To facilitate this call to the server, a McAfee Agent is deployed to each system in your network. Once an agent is deployed to a system, the system can be managed by your McAfee ePO server. Secure communication between the server and managed system is the bond that connects all the components of your ePolicy Orchestrator software. The figure below shows an example of how your McAfee ePO server and components inter-relate in your secure network environment.

ePO server components

1 Your McAfee ePO server connects to the McAfee update server to pull down the latest security content.

2 The ePolicy Orchestrator database stores all the data about the managed systems on your network,including:

  • System properties
  • Policy information
  • Directory structure
  • All other relevant data the server needs to keep your systems up-to-date.

3 McAfee Agents are deployed to your systems to facilitate:

  • Policy enforcement
  • Product deployments and updates
  • Reporting on your managed systems

4 Agent-server secure communication (ASSC) occurs at regular intervals between your systems and server. If remote Agent Handlers are installed in your network, agents communicate with the server through their assigned Agent Handlers.

5 Users log onto the ePolicy Orchestrator console to perform security management tasks, such as running queries to report on security status or working with your managed software security policies.

6 The McAfee update server hosts the latest security content, so your ePolicy Orchestrator can pull the content at scheduled intervals.

7 Distributed repositories placed throughout your network host your security content locally, so agents can receive updates more quickly.

8 Remote Agent Handlers help to scale your network to handle more agents with a single McAfee ePO server.

9 Automatic Response notifications are sent to security administrators to notify them that an event has occurred.

Q.6  What is default Console Port of ePO?

Console-to-application server communication port 8443 ( TCP port that the ePO Application Server service uses to allow web browser UI access )

Q.7  What is the default Group policy of ePO?

Until you create additional policies, all computers are assigned the McAfee Default policy.

The McAfee Default policy is configured with settings recommended by McAfee to protect many environments and ensure that all computers can access important websites and applications until you have a chance to create a customized policy.

You cannot rename or modify the McAfee Default policy. When you add computers to your account, the McAfee Default policy is assigned to them. When you delete a policy that is assigned to one or more groups, the McAfee Default policy is assigned to those groups automatically.

The first time you create a new policy, the McAfee Default policy settings appear as a guideline. This enables you to configure only the settings you want to change without having to configure them all.

After you create one or more new policies, you can select a different default policy for your account. In the future, new policies will be prepopulated with these default settings, and the new default policy is assigned to new computers (if no other policy is selected) and groups whose policy is deleted.

Q.8  On which port ePO communicates with client agent?

Agent wake-up communication port SuperAgent repository port: 8081

(TCP port that agents use to receive agent wake-up requests from the ePO server or Agent Handler.
TCP port that the SuperAgents configured as repositories that are used to receive content from the ePO server during repository replication, and to serve content to client machines)

Q.9  What is the purpose of a SuperAgent?

The SuperAgent is an agent with the ability to contact all agents in the same subnet as the SuperAgent, using the SuperAgent wakeup call. Its use is triggered by Global Updating being enabled on the ePolicy Orchestrator (ePO) server, and it provides a bandwidth efficient method of sending agent wakeup calls.

If you operate in a Windows environment and plan to use agent wake-up calls to initiate Agent-server communication, consider converting an agent on each network broadcast segment into a SuperAgent.

SuperAgents distribute the bandwidth load of concurrent wake-up calls. Instead of sending agent wake-up calls from the server to every agent, the server sends the SuperAgent wake-up call to SuperAgents in the selected System Tree segment. When SuperAgents receive this Wake-up call, they send broadcast wake-up calls to all agents in their network broadcast segments.

The process is:

  1. Server sends a wake-up call to all SuperAgents.
  2. SuperAgents broadcast a wake-up call to all agents in the same broadcast segment.
  3. All agents (regular agents and SuperAgents) exchange data with the server.
  4. An agent without an operating SuperAgent on its broadcast segment is not prompted to communicate with the server.

To deploy enough SuperAgents to the appropriate locations, first determine the broadcast segments in your environment and select a system (preferably a server) in each segment to host a SuperAgent. Be aware that agents in broadcast segments without SuperAgents do not receive the broadcast wake-up call, so they do not call in to the server in response to a wake-up call.

Agent and SuperAgent wake-up calls use the same secure channels. Ensure that:

  • The agent wake-up communication port (8081 by default) is not blocked.
  • The agent broadcast communication port (8082 by default) is not blocked.

Q.10  What is McAfee Agent Handler?

Agent handlers are the component of ePolicy Orchestrator that handles communications between agent and server.

Multiple remote handlers can help you address scalability and topology issues in your network, and in some cases using multiple agent handlers can limit or reduce the number of ePO servers in your environment. They can provide fault tolerant and load-balanced communication with a large number of agents including geographically distributed agents.

Q.11  How agent handlers work ?

Agent handlers distribute network traffic generated by agent-to-server communication by assigning managed systems or groups of systems to report to a specific agent handler. Once assigned, a managed system performs regular ASCIs to its agent handler instead of the main ePO server. The handler provides updated site lists, policies, and policy assignment rules just as the ePO server does. The handler also caches the contents of the master repository, so that agents can pull product update packages, DATs, and other necessary information.

NOTE: When an agent checks in with its handler, if the handler does not have the updates needed, the handler retrieves them from the assigned repository and caches them, while passing the update through to the agent.

Q.12  Considerations for scalability ?

How you manage your scalability depends on whether you use multiple McAfee ePO servers, multiple remote Agent Handlers, or both.With ePolicy Orchestrator software, you can scale your network vertically or horizontally.

  • Vertical scalability — Adding and upgrading to bigger, faster hardware to manage larger and larger deployments. Scaling your McAfee ePO server infrastructure vertically is accomplished by upgrading your server hardware, and using multiple McAfee ePO servers throughout your network, each with its own database.
  • Horizontal scalability — Accomplished by increasing the deployment size that a single McAfee ePO server can manage. Scaling your server horizontally is accomplished by installing multiple remote Agent Handlers, each reporting to a single database.

Q.13  When to use multiple McAfee ePO servers ?

Depending on the size and make-up of your organization, using multiple McAfee ePO servers might be required.

Some scenarios in which you might want to use multiple servers include:

  • You want to maintain separate databases for distinct units within your organization.
  • You require separate IT infrastructures, administrative groups, or test environments.
  • Your organization is distributed over a large geographic area, and uses a network connection with relatively low bandwidth such as a WAN, VPN, or other slower connections typically found between remote sites.

Using multiple servers in your network requires that you maintain a separate database for each server.

You can roll up information from each server to your main McAfee ePO server and database.

Q.14  When to use multiple remote Agent Handlers ?

Multiple remote Agent Handlers help you manage large deployments without adding additional McAfee ePO servers to your environment.

The Agent Handler is the component of your server responsible for managing agent requests. Each McAfee ePO server installation includes an Agent Handler by default. Some scenarios in which you might want to use multiple remote Agent Handlers include:

  • You want to allow agents to choose between multiple physical devices, so they can continue to call in and receive policy, task, and product updates; even if the application server is unavailable, and you don’t want to cluster your McAfee ePO server.
  • Your existing ePolicy Orchestrator infrastructure needs to be expanded to handle more agents, more products, or a higher load due to more frequent agent-server communication intervals (ASCI).
  • You want to use your McAfee ePO server to manage disconnected network segments, such as systems that use Network Address Translation (NAT) or in an external network.

Multiple Agent Handlers can provide added scalability and lowered complexity in managing large deployments. However, because Agent Handlers require a very fast network connection, there are some scenarios in which you should not use them, including:

  • To replace distributed repositories. Distributed repositories are local file shares intended to keep agent communication traffic local. While Agent Handlers do have repository functionality built in, they require constant communication with your ePolicy Orchestrator database, and therefore consume a significantly larger amount of bandwidth.
  • To improve repository replication across a WAN connection. The constant communication back to your database required by repository replication can saturate the WAN connection.
  • To connect a disconnected network segment where there is limited or irregular connectivity to the ePolicy Orchestrator database.

Q.15  What is DLP ?

Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.

Q.16  What is Endpoint Encryption for PC?

Endpoint Encryption for PC (EEPC) is a computer security system that prevents data stored on a hard drive from being read or used by an unauthorized person. With EEPC, users are forced to identify themselves to the security system when the computer is started. This is done by requiring up to three authentication methods:

  • Password
  • User ID
  • Token (Loaded on a floppy disk or any ISO 7816 smart card)

If the person accessing the computer fails to enter the correct information, EEPC prevents access to the computer as well as the encrypted data stored within. To gain access to an EEPC protected PC when using a smart card, users must insert their card into the reader when the EEPC authentication screen is displayed, then type their password and optional user ID. After the smart card verifies the password and  EEPC has established that the correct token is used, the user is then granted access to the computer.

 Q.17  Is the Event Parser service running?

On the server side, ePO consists of three separate services:

  • The ePO Server service, responsible for the direct handling of Agent-to-Server communication;
  • The Event Parser service, responsible for the insertion of new client-generated events into the ePO database;
  • The ePO Server Application Server service, where all logic takes place and which also allows you to manage ePO.

Under certain circumstances, particularly when there is a problem with the database, it is possible the Event Parser service stops working. This prevents new events from being added to the database, essentially leaving you blind. Check whether the Event Parser service is running and correct any problems if this is not the case.

 Q.18 Explain Tag and Tags functionality in McAfee ePO?

Tags allow users to create labels that can be applied to systems manually or automatically, based on the criteria assigned to the tag.

Similar to IP sorting criteria, you can use tags for automated sorting into groups. Tags are used to identify systems with similar characteristics. If you organize some of your groups by such characteristics, you can create and assign tags based on such criteria and use these tags as group sorting criteria to ensure these systems are automatically placed within the appropriate groups.

Tag functionality:
You can do the following with tags:

  • Apply one or more tags to one or more systems.
  • Apply tags manually.
  • Apply tags automatically, based on user-defined criteria, when the agent calls in.
  • Exclude systems from tag application.
  • Run queries to group systems with certain tags, then take direct actions on the resulting list of systems.
  • Base System Tree sorting criteria on tags to place systems into the appropriate System Tree groups automatically.

Types of tags

There are two types of tags:

  • Tags without criteria – These tags can be applied only to selected systems in the System Tree (manually) and systems listed in the results of a query (manually or on a scheduled basis).
  • Criteria-based tags – These tags are applied to all non-excluded systems at each agent-server communication. Such tags use criteria based on any properties sent by agent. They can also be applied to all non-excluded systems on-demand.

 Q.19  How agent-server communication works ?

McAfee Agent communicates with the McAfee ePO server periodically to send events and, ensure all settings are up-to-date.

These communications are referred to as agent-server communication. During each agent-server communication, McAfee Agent collects its current system properties, as well as events that have not yet been sent, and sends them to the server. The server sends new or changed policies and tasks to McAfee Agent, and the repository list if it has changed since the last agent-server communication. McAfee Agent enforces the new policies locally on the managed system and applies any task or repository changes.

The McAfee ePO server uses an industry-standard Transport Layer Security (TLS) network protocol for secure network transmissions.

When the McAfee Agent is first installed, it calls in to the server within few seconds. Thereafter, the McAfee Agent calls in whenever one of the following occurs:

  • The agent-server communication interval (ASCI) elapses.
  • McAfee Agent wake-up calls are sent from the McAfee ePO server or Agent Handlers.
  • A scheduled wake-up task runs on the client systems.
  • Communication is initiated manually from the managed system (using Agent Status monitor or command line).
  • McAfee Agent wake-up calls sent from the McAfee ePO server.

 Q.20 How often the McAfee Agent calls into the McAfee ePO server ?

The Agent-to-Server Communication Interval (ASCI) default setting is 60 minutes means that McAfee Agent contacts the McAfee ePO server once every hour.


Source: McAfee,  dearbytes

Great Google Secrets

Finding useful information on the ­World Wide Web is something many of us do. We can find information about anything by searching online. Google is the most popular search engine available, but navigating it can sometimes be tricky.

But most people don’t use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 30 trillion pages in Google’s index, it’s still a struggle to pare results to a manageable number.

Google’s algorithm keeps improving, and without context, it’s hard for Google to know exactly what you’re looking for, especially if your inquiry is highly specific. But there are a few tricks for searching that can help you quickly find the results you’re looking for. Tricks like formatting and punctuation can really help narrow down your search.

So learn some of these tricks on how to be effective at “Googling”:

How-to-be-a-google-power-user-1 (more…)

How to enable the ‘God Mode’ in Windows 10

Windows 10 “GodMode” is the feature something that not many Windows users will be aware of. However,

GodMode is built into Windows 10, just as it was in previous Windows versions.

In fact, its real name is the Windows Master Control Panel shortcut.

Follow the steps given below to enable the God Mode in your Windows 10:

  1. Create a new folder on your Windows desktop (New –>Folder) and save it with the name: {ED7BA470-8E54-465E-825C-99712043E01C}
  2. The folder’s icon will change to an icon as of a Control Panel. Double-click on the new icon to see your universal settings panel.
  3. You can name the folder other than “GodMode”; before the Period (.).
  4. Now, click the folder, open it and get God-like access to more than 260 functions and tools.

Some functions are unique to Windows 10 while others are similar to the previous versions of Windows.

God-Mode-folder-icon (2)


when you open that folder, you can see around 40 different settings, including Devices and Printers, Credential Manager, Indexing, etc. Some variations exist depending if you have a Home or Pro version and different hardware.

Note – your system account must have administrative privileges for this folder to work.

Source: Microsoft, windows 10

How to find system up-time on Windows 7, 8 & 2008 Server

If you leave your computer on for extended periods of time, it’s usually a good idea to perform a reboot now and then. Furthermore, if you’re managing multiple computers, it’s difficult to remember when each received a reboot. That’s why Windows keeps track of your total up-time and the last time your computer booted for you. Here’s how to access those pieces of information:

To find total up-time:

Step 1: Launch the task manager. You can do this in one of three ways:

Choice 1: Press Ctrl+Alt+Delete. On the screen that appears, select Start Task Manager.

Choice 2: Right click on the taskbar and select Start Task Manager.

Choice 3: Press CtrlL+Shift+Esc to launch the task manager directly.

Step 2: In this window, click on the Performance tab.

Task Manager-1

Task Manager

Step 3:  Your system’s up-time is displayed next to Up Time (highlighted in the above picture) in the format of Days: Hours: Minutes: Seconds

To find last boot date:

Go to Start  –> Run –> cmd


In the command prompt, run the following commands: systeminfo | find /i “Boot Time”


systeminfo | find “Time:”


systeminfo | find “System Boot Time”



Happy Computing :-)

source: cnet, superuser, serverfault

Top free tools for every Windows desktop

  • 1.   7-Zip:Every desktop user needs 7-Zip. While Windows 8 (finally!) added the ability to look into ISO files — you still need 7-Zip to see them in Win7 — Win8’s Windows Explorer still doesn’t support RAR compressed files, which are becoming more common as Mac use continues to rise. 7-Zip also creates password-protected Zip files, as well as self-extracting Zips.

     You don’t need to register or pay for 7-Zip. To download go to

   2.  CCleaner:

CCleaner is the number-one tool for cleaning your Windows PC. It protects your privacy online and makes your       computer faster and more secure. Easy to use and a small, fast download.

It removes unused files from your system – allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully               featured registry cleaner. But the best part is that it’s fast (normally taking less than a second to run)

 Cleans the following:

 Internet Explorer
Temporary files, history, cookies, super cookies, Autocomplete form history, index.dat files.

Temporary files, history, cookies, super cookies, download history, form history.

 Google Chrome
Temporary files, history, cookies, super cookies, download history, form history.

Temporary files, history, cookies, super cookies, download history.


 Temporary files, history, cookies, super cookies, form history.

Other Supported Browsers
K-Meleon, Rockmelt, Flock, Google Chrome Canary, Chromium, SeaMonkey, Chrome Plus, SRWare Iron, Pale Moon, Phoenix, Netscape Navigator, Avant and Maxthon.

Recycle Bin, Recent Documents, Temporary files, Log files, Clipboard, DNS Cache, Error Reporting, Memory Dumps, Jump Lists.

  Registry Cleaner
Advanced features to remove unused and old entries, including File Extensions, ActiveX Controls, ClassIDs, ProgIDs, Uninstallers, Shared DLLs, Fonts, Help Files, Application Paths, Icons, Invalid Shortcuts and more…

Third-party applications

Removes temp files and recent file lists (MRUs) from many apps including Windows Media Player, eMule, Google                 Toolbar, Microsoft Office, Nero, Adobe Acrobat, WinRAR, WinAce, WinZip and many more…

   3.    Auslogics Duplicate File Finder:

Auslogics Duplicate File Finder is a basic program that allows users to find and delete duplicate files taking                             up valuable space on their hard drives.

Auslogics Duplicate File Finder is free. It installs and uninstalls without issues. I recommend this program to all                  users; even those with limited system maintenance experience will find it easy to use.


 4. VLC Media Player:

Simple, fast and powerful media player.

Plays everything: Files, Discs, Webcams, Devices and Streams.

Plays most codecs with no codec packs needed:

MPEG-2, DivX, H.264, MKV, WebM, WMV, MP3…

Runs on all platforms: Windows, Linux, Mac OS X, Unix…

Completely Free, no spyware, no ads and no user tracking.

Can do media conversion and streaming. Download VLC player VLC

 5. Revo Uninstaller:  

         well and truly uninstalls programs, and it does so in an unexpected way. When you use Revo, it runs the program’s           uninstaller and watches while the Uninstaller works, looking for the location of the program files and for Registry               keys that the uninstaller zaps. It then goes in and removes leftover pieces, based on the locations and keys that the           program’s Uninstaller took out. Revo also consults its own internal database for commonly-left-behind bits, and                 roots those out as well. To download go to Revo Uninstaller

 6. Recuva:

Recuva recovers files deleted from your Windows computer, Recycle Bin, digital camera card, or MP3                                      player. Recuva works on any re-writable media you have.


If you listen to music on an iPod, Recuva can recover files directly from the iPod’s drive. Even though you can’t                  access files on your iPod directly, Recuva can. You don’t have to worry about losing music from iTunes or your iPod        anymore. To download go to Recuva

  7.  Kaspersky TDSSKiller:

The name may lead you to believe that TDSSKiller kills the TDSS rootkit, but the product does much more simply               because so many common rootkits are based on, or derived from, TDSS. The current version detects and removes             SST, Pihar, ZeroAccess, Sinowal, Whistler, Phanta, Trup, Stoned, RLoader, Cmoser, and Cidox. Unlike most rootkit             killers, this one runs in Windows.


To run the program, fill out the form on the TDSSKiller page, wait for Kaspersky to send you a download link.                       Download the program and run it — no installer, just an EXE. If any rootkits are found, you’ll be given the                               opportunity to Delete/Cure, Copy to quarantine, or Skip each identified interloper.

To download go to Kaspersky TDSSKiller

  8. YTD Video Downloader: 

YTD Video Downloader is a great solution to grab the media you need, straight from YouTube, Facebook, Vimeo and       60+ other websites. YTD allows you to manage downloads and conversions on the fly.

YTD Video Downloader


  • Video Conversion: With YTD you can convert video media to 9 different formats including WMV, AVI and MP3.
  • Conversion Quality: YTD allows you to convert video files in 5 different qualities.
  • Audio Only: With YTD you can grab a video file and then covert the file to audio-only in an MP3 format.

To download go to YTD Video Downloader

9.  Secunia PSI: 

The Secunia Personal Software Inspector (PSI) is a free computer security solution that identifies vulnerabilities in            non-Microsoft (third-party) programs which can leave your PC open to attacks.

Simply put, it scans software on your system and identifies programs in need of security updates to safeguard your     PC against cybercriminals. It then supplies your computer with the necessary software security updates to keep it       safe. The Secunia PSI even automates the updates for your insecure programs, making it a lot easier for you to  maintain a secure PC.

Using a scanner like Secunia PSI 3.0 is complementary to antivirus software, and as a free computer security program, is essential for every home computer.

10. Malwarebytes: 

Malwarebytes is different. The free version is designed to run manually — I run mine once a week. Malwarebytes       picks up all sorts of creepy crawlies that get past AV programs. When combined with the support on the                                   Malwarebytes forum, Malwarebytes is the ultimate fallback for infected systems — whether you know they’re infected       or not. To download go to Malwarebytes.


Source:  itworld