CryptoLocker Protection


Protect your home or business from Ransomware like Cryptolocker, the newest and most nefarious threat against computer security to date.

Avoid costly downtime and data recovery services and use our C-Net Ransom Defender to secure your systems!

Learn More

How Our Service Works

Play our comercial

We Fix IT Over The Internet!

How to use ExpertSupportNow
Click here to watch

Spyware Removal Guide

Remove Spyware Yourself
Instant download! Learn how the experts remove spyware and speed up PCs.

Our Do-It-Yourself Guide will teach you Step by Step how to remove spyware, cleanup your PC keep it running fast, safe and protected.

Click here for more details!

New Support Session

ExpertSupportNow Connection
Please enter your name or company name and support key above as directed by our support staff.

Need a support key? Click here

Monthly Archives: September 2010

Security Essentials 2010

Security Essentials 2010

At first glance anyone may think that this program is legit, but after the program runs the scan of your computer it will then direct you to one of five different “anti-virus” websites claiming those are the only programs that are able to fix the computers current issues. Security Essentials 2010 pops up during startup and will sometimes cause windows to not launch windows explorer, or internet explorer.

Registry entries that the programs makes are:

  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop “NoChangingWallpaper” = “1”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer “NoActiveDesktopChanges” = “1”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer “NoSetActiveDesktop” = “1”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = “1”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Security essentials 2010”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “smss32.exe”

How to remove Security Essentials 2010

Please contact us at for more information on Security Essentials 2010

Injector.BZ Pop Up

Injector.BZ Pop Up

Trojan.Injector.BZ is a type of rouge anti-spyware (or scareware) designed to make fake security warnings appear after the program “scans” the user’s computer. Typically this program will start when the user turns on their machine, once the desktop appears; a fake security application will open up, Antivirus GT, and will perform a scan on the computer. the results will show that the PC has errors and the only way to remove the errors is to purchase their product.

Following Error message appears

Registry changes that occur:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3304F17F-732C-4AC6-BF67-DBDC8B88C11F}
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “AVGT”
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform “WinNT-EVI 05.07.2010″

How to remove Injector.BZ Pop Up

Please contact us at for more information on Injector.BZ Pop Up



A trojan that displays advertisements (Pop-up windows), downloads and executes files that will update and add additional malware. This trojan may be distributed by sites claiming to be a Microsoft Outlook add-on used to display emoticons.

When the installer for this trojan is run, the following files are added to your system:

  • %ProgramFiles%\MailSkinner\anim_0.gif
  • %ProgramFiles%\MailSkinner\anim_help.gif
  • %ProgramFiles%\MailSkinner\MailSkinner.exe

in addition to files being installed the following registry entries are added

  • HKEY_CLASSES_ROOT\CLSID\{180B4EE9-1795-4429-9651-F17A6515726D}
  • HKEY_CLASSES_ROOT\OutlookAddin.Addin.1
  • HKEY_CLASSES_ROOT\OutlookAddin.Addin

How to remove Skintrim

Please contact us at for more information on Skintrim if you need help.

Generic VB.i Trojan

Generic VB.i

Generic VB.i, Generic.dx!toj, Generic Downloader.z are Trojan viruses  that add harmful files to your system, as well as adds and changes registry values in windows. users usually get Trojan viruses from P2P file sharing programs, hacked or malicious sites . Unlike spyware Trojans are downloaded from a site or an email and do not self-replicate. Trojans generally trick users to download the infected file claiming to be a helpful or beneficial program that. The following are some examples of registry changes that are done to an infected system:


How to remove Generic VB.i , Generic.dx!toj, Generic Downloader.z Trojan

Please contact us at for more information on Generic VB.i or Generic Downloader.z if you need help.