Pro tip: Sort table data in a Word document

sort word

Microsoft Word

 

Sorting data in a Word document isn’t something you routinely do. On the other hand, presenting list and table data is, so the potential exists that one day you’ll want to sort something. The good news is that it’s easy to sort data in a table or a list. In this article, I’ll show you how to do just that. We’ll work through a few simple sorting examples. You can use most any table, or you can download the example .docx or .doc file.

Behind the scenes

Word relies on paragraphs when sorting, which seems a bit odd within the context of a table (or list). The paragraph formatting mark determines where one paragraph ends and the next starts. As you can see in Figure A, there’s no paragraph mark in a table. The end-of-cell markers denote the end of each cell’s content. The similar marker at the end of each row (outside the right border) is an end-of-row marker. These markers also contain cell and row formatting. When sorting a table, Word relies on the end-of-row marker to identify where one row ends and the next begins, the same way the paragraph mark does. (To see a document’s formatting symbols, click Show/Hide in the Paragraph group on the Home tab.)

Figure A

Table end-of-row markers are similar to paragraph markers.

Sort by the first column

We’ll start with the simplest sort possible; we’ll sort a table by the values in the first column. To do so, select, the table by clicking its move handle (the small square in the top-left corner). If you don’t see this handle, check the view. It’s available only in Print Layout and Web Layout. With the entire table selected, do the following:

  1. Click the contextual Layout tab. In the Data group, click Sort — or click Sort in the Paragraph group on the Home tab. In Word 2003, choose Sort from the Table menu.
  2. The resulting dialog does a good job of anticipating the sort. Notice that the Header Row option (at the bottom) is selected. As a result, the Sort By field is set to Species — the label in the first column’s header (Figure B).
    Figure B

  3. This is exactly what we want, so click OK. Figure C shows the sorted table.
    Figure C

Before we move on, let’s discuss the Type and Using options to the right. We didn’t need to change either, but sometimes you will. The Type options are Text, Number, and Date. Word usually defaults to the appropriate data type. You can force a specific type by choosing a different option other than the one Word assumes (but you’ll rarely have reason to do so). The Using options defaults to Paragraph — we talked about that earlier.

Sort by the second column

That first exercise was easy. Let’s complicate things a bit by sorting by the second column. Fortunately, it’s just as easy as the first. Repeat steps 1 and 2 from the first exercise. Then, do the following:

  1. In the resulting dialog, click the Sort By drop-down.
  2. Choose Common Name, the header label for the second column.
  3. Click OK. Figure D shows the results of sorting by the second column.
    Figure D

That wasn’t any more difficult that the first sort. Tell Word which column contains the values you want to sort by and click OK — that’s it!

Sort by multiple columns

With only two sort tasks under your belt, you’re beginning to see how simple the sorting process in Word can be. Let’s complicate things a bit so you can see how flexible this feature truly is. Let’s sort by the Class column and then sort the bird and mammal groups in a secondary sort. Repeat steps 1 and 2 from the first two exercises. Then, do the following:

  1. To sort by the Class, choose Class from the Sort By drop-down.
  2. To further sort each class group, click Common Name from the Then by drop-down (Figure E). You could add a third column to the sort if the results warranted the additional grouping.
    Figure E

  3. Click OK to see the results shown in Figure F.
    Figure F

What about lists?

You might be wondering how to sort the same data in list form. Word handles the list sort the same way — the exact same way. Highlight the list and click Sort in the Paragraph group on the Home tab. In the resulting dialog, check the header option and set appropriately (if necessary). Then, determine the sort order by choosing the fields (columns), appropriately.Figure G shows the result of sorting the same data in list form.

Figure G

Sort a columnar list the same way you sort a table.

 

Lync Online

lync

Microsoft Lync

Lync Online

Overview

Lync Online connects people everywhere, on devices running Windows 8 and other operating systems, as part of their everyday productivity experience. Lync provides a consistent, single client experience for presence, instant messaging, voice, video and a great meeting experience. Lync enables instant messaging (IM) and voice calling with the hundreds of millions of people around the world who use Skype.

How it works

Organizations can purchase Lync Online as a standalone service from Microsoft Office 365 or as part of an Office 365 for enterprises suite that includes Lync Online, Microsoft Exchange Online, Microsoft SharePoint Online, Microsoft Office Professional Plus, and Microsoft Office Online. Organizations that subscribe to Lync Online retain control over the collaboration services they offer to users, but they do not have the operational burden of on-premises server software. With the Lync Online multi-tenant hosted plans, Lync is hosted on multi-tenant servers that support multiple customers simultaneously. These servers are housed in Microsoft data centers and are accessible to users on a wide range of devices from inside a corporate network or over the Internet.

Lync Online features

  • Get real-time presence information—including photos, availability status, and location—and enhanced instant messaging (IM) to connect efficiently and effectively.
  • Make voice calls through your computer to other Lync or Skype users in your organization or in other organizations that use Lync or Skype.
  • Create, moderate, and join pre-planned and on-the-fly audio, video, and web meetings with people inside and outside your organization.
  • Enhance online presentations with screen-sharing and virtual whiteboards.
  • Let customers participate in your Lync conference calls even if they are not Office 365 or Lync Online customers.

Office 365 FastTrack and adoption offer

FastTrack is the onboarding service benefit included for qualified Office 365 customers. South Jersey Techies experts will provide personalized assistance ensuring the service is ready to use company-wide.

If you are interested in Lync Online or would like to sign up for a trial please click here or contact us at 856-745-9990.

National Cyber Security Awareness Month Tips

360px-US_Department_of_Homeland_Security_Seal.svg

October is National Cyber Security Awareness Month by Department of Homeland Security.

National Cyber Security Awareness Month encourages vigilance and protection by sharing tips and best practices in regard to how to stay safe.

Small businesses are a large target for criminals because they have limited resources dedicated to information system security.  Cyber criminals look for access to sensitive data.

Create a cyber security plan

The Federal Communications Commission offers a Cyber Planner for small businesses.  The planner guide allows specific sections to be added to your guide, including Privacy and Data Security, Scams/Fraud, Network Security, Website Security, Email, Mobile Devices, Employees, Facility Security, Operational Security, Payment Cards, Incident Response/Reporting and Policy Development/Management.

Generate a personalized Small Biz Cyber Planner Guide.

Establish Rules and Educate Employees

Create rules and guidelines for protecting information.  Educate employees on how to post online in a way that does not share intellectual property.  Clearly explain the penalties for violating security policies.

Network Protection

Deploy and update protection software, such a antivirus and antispyware software, on each computer within your network.  Create a regularly scheduled full computer scan.

Manage and assess risk

Cyber criminals often use small businesses that are less-protected to get to larger businesses.  Being a victim of a cyber-attack can have a huge impact on any business including financial issues, loss of possible business partner(s) and many more issues.

Download and install software updates

Installing software updates from vendors can protect your network for unwanted viruses and malware.  Vendors frequently release patches/updates for their software to improve performance and fine-tune software security.  (Example:  Adobe Reader, Adobe Flash and Java updates are critical for protection.)

Backup important business data and information

Create a backup plan for all data including documents, databases, files, HR records and accounting files.  A regularly scheduled backup can be a full, differential or incremental.

  • Full Backup:  Backup of all data.
  • Differential Backup:  Backup of all data that has changed since the last full backup.
  • Incremental Backup:  Backup of all data that has changed since the last full or incremental backup.

Control physical access

Protecting physical property is a very important role in protecting intellectual data.  Create a physical security plan to prevent unauthorized access to business computers and components. 

Secure Wi-Fi

Securing your Wi-Fi network consists of a few configurations.  Configure a device administrator password for your wireless access point (WAP) or router, require a password for Wi-Fi access and do not allow the WAP or router to broadcast the Service Set Identifier (SSID), also known, as network name.

 

10 Purchases for Small & Medium-Size Businesses

Saving-Money

Small and Medium-Size Businesses (SMBs) will often take shortcuts to cut costs when purchasing.  To avoid disasters such as a loss of data or work, SMBs are strongly suggested to focus on the ten points below.

Hardware

Considering the rapid change of technology requirements, a pro-active approach for replacing desktops, laptops, servers, and networking hardware is to look five years into the future.

Backup Software

Although built-in backup software and Windows Server backup are adequate, purchasing a third-party backup solution will have the ability to recover from an image.

Internet Connection

Providing your SMB with a consumer-grade DSL line would not be an efficient business plan. Setting up a network that provides your business with more bandwidth than required will prevent a network bottleneck from occuring.

Firewall

Securing your business with only Windows built-in firewall is not ideal.  Configuring a Cisco, Fortinet, or Sonicwall is more secure, reliable and flexible in a SMB environment.

Cloud Storage

Cloud storage provides scalability, reliability and portability.  Cloud storage is divided into three categories:  Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).  Many companies are transferring to Cloud services for access to data outside the network.

Website

Online presence has become an important key for all businesses.  A solid solution is to have a strong website, blogging and effectively using social media.

Redundancy

Redundancy is an appropriate investment towards ensuring that your SMBs network does not go down.  Similar to backups, redundancy does not affect everyday business but should an incident arise, you’ll be glad it’s there.

Support

IT Support is a necessity, whether it’s an in-house department, third-party service provider, or support for software.

Mobile Devices

The ability to work from outside the office and accessing data from anywhere  is now an important key for businesses.  Setting up a virtual private network enables laptops, tablets and smartphones to connect and work from anywhere.

Printers

Supply your SMB with a printer that has the sustainability and features required for business use.

 

10 free anti-malware tools worth checking out

Over the last few years, anti-malware software has become increasingly costly. But believe it or not, there are still ways to protect your computer for free. In this article, I will list 10 free utilities you can use to either prevent malware infections or to help clean up the mess once a PC becomes infected.

1: AVG Anti-Virus Free Edition 2011
I have been using AVG’s free antivirus product for a few years now, and although it isn’t perfect, it seems to be at least as good as most of the commercial anti-malware products. AVG’s free edition provides basic protection against viruses and spyware, but the company also offers a more comprehensive security suite called AVG Internet Security 2011. This suite offers the same anti-malware protection as the free edition, but it also provides real-time protection against Internet search and social networking sites.

2: Comodo Antivirus
Comodo Antivirus takes a different approach to virus protection than most other antivirus products do. Comodo is based on the idea that it is foolish to allow code to run without first proving itself to be benign. So Comodo implements a default denial until an executable proves itself trustworthy. To keep the software from being too chatty, Comodo executes unknown code in an isolated sandbox where its behavior can be monitored without running the risk of the executable harming the system.

3: PC Tools AntiVirus Free 2011
PC Tools AntiVirus Free 2011 is a basic antivirus / anti-spyware program that is designed to protect Windows desktops against various forms of malware. Besides its basic detection capabilities, PC Tools includes a feature called Search Defender that is designed to warn you about unsafe Web sites (or phishing sites) before you click on them. The software also includes a File Guard component that monitors the file system and blocks attempted malware infections in real time.

4: Avast Free Antivirus
Like AVG, Avast sells comprehensive security suites, but makes its basic antivirus / anti-spyware product available for free to home users. Although I have never used Avast Free Antivirus, I’ve recently noticed posts in various message boards from people who claim that Avast provides better protection than some of the commercial products.

5: Ad-Aware Free Internet Security
Although it was originally designed as a product for detecting adware, Lavasoft’s Ad-Aware has evolved into a complete anti-malware product. Ad-Aware Free Internet Security provides real-time protection against spyware, rootkits, and more. It also includes a utility called The Neutralizer, which you can use to clean a PC that has already been infected.

6: HijackThis
HijackThis is one of my favorite anti-malware utilities, but it’s not for the faint of heart. HijackThis is designed to compile a report of critical file and registry settings that are often prone to viral infections. The thing that makes HijackThis difficult to use is that it makes no distinction between malicious and legitimate entries. As a result, you can end up doing even more damage to a PC unless you know what you are doing. Even so, I consider HijackThis to be a must-have utility.

7: Microsoft Security Essentials
Microsoft provides free antivirus protection for home users through a relatively new application called Microsoft Security Essentials. Microsoft Security Essentials is based on the same ForeFront technology as Microsoft’s enterprise class anti-malware software. The difference is that Microsoft Security Essentials is available solely to home users and businesses with fewer than 10 Windows desktops.

8: Windows Defender
Microsoft’s Windows Defender is a free anti-spyware utility for Windows. It’s not comprehensive, but it does a surprisingly good job of protecting Windows as long as you install it before an infection occurs.
Windows Defender is included with Windows Vista and Windows 7, but you can also download a version for Windows XP. If you are using Windows 7 or Windows Vista, Windows Defender is disabled by default. You can enable Windows Defender by typing the word Defender into the Windows search box and then double-clicking on the Windows Defender option. When you do, Windows will tell you that Windows Defender is turned off and will give you the opportunity to enable it.

9: Malicious Software Removal Tool
Although not a comprehensive antivirus tool by any stretch of the imagination, Microsoft’s Malicious Software Removal Tool does a good job of detecting and removing the most common viruses. The Malicious Software Removal Tool works with Windows 7, Vista, XP, and Server 2003. Microsoft releases updates to this tool on the second Tuesday of each month.

10: McAfee virus removal tools
McAfee makes commercial antivirus products, but it also offers some free tools for removing viruses. Specifically, it offers tools for removing Sasser, Bagle, Zafi, Mydoom, Lovsan / Balster, Klez, and Bugbear. You can download all of these tools here

To view the original article in it’s entirety Click Here

iPad’s big upgrade: The top 10 iOS features for business

Apple has released the first major software update for the iPad. The 4.2 version of iOS brings a slew of new capabilities to the iPad, including many that will be of interest to business professionals and to IT departments that have deployed or are considering a deployment of the iPad.

The update, which is available as a free download through iTunes, is the first jump to iOS 4 for the iPad. The iPhone got iOS 4 in the spring but the iPad has been stuck on iOS 3.2 until now. With iOS 4.2, the two devices are now unified on the same operating system (along with the iPod Touch as well).

Below is my list of the 10 most important iOS 4 updates for iPad business users.

1. Multitasking
The biggest factor holding back the iPad has been its lack of multitasking. With the 4.2 update, multitasking has finally arrived. It works the same way as iPhone multitasking, which arrived earlier this year. To be clear, iOS 4.2 multitasking is actually more like quick-switching between apps while saving the state of open apps. But, at least it changes the iPad from being a one-app-at-a-time experience. This is especially important for workers who need to copy-and-paste between apps and do other types of multi-app integration. To access multitasking you simply double-click the home button.

2. AirPlay
AirPlay is the flashiest new feature in iOS 4.2. It allows you to quickly stream media from an iPad (or iPhone or iPod Touch) to an Apple TV. The functionality is in its infancy and it may not sound like it has much use for business, but it could be huge. Today, once you have video or photo open, it only takes two taps to throw it up on the big screen. Plus, you can almost-instantaneously switch between different presenters. In the future, imagine hooking up an Apple TV — a tiny $99 box not much bigger than a smartphone — to a projector or a 60-inch LCD TV in a conference room and being able to quickly and easily share charts, graphs, media clips, and presentations straight from your iPad. Look for lots of apps to find ways to take advantage of AirPlay.

3. Wireless app distribution
With 4.2, enterprises can push out their own custom business apps to corporate iPad users over Wi-Fi or 3G. The apps don’t have to go through the Apple App Store and users don’t have to sync through iTunes or a computer in order to get the company apps.

4. AirPrint
Another one of the most talked-about features of 4.2 is AirPrint, which lets you print wirelessly from the iPad. The implementation on this is pretty good. A print option is added to the menu for printing documents, photos, and web pages and the iPad automatically recognizes compatible printers nearby. Unfortunately, the list of compatible printers is very small for now, and apps will need to add this functionality to their software so that printing will be possible in more places on the iPad.

5. Find My iPad
This was previously part of Apple’s paid MobileMe service but with iOS 4.2 it is now a free option. Once you activate this on your iPad you can go to the Apple website to locate your lost iPad on a map, send a message to display on the iPad screen (”I lost my iPad, please call 987-654-3210?), set a remote passcode to lock out prying eyes, or even remotely wipe the device and all of its data.

6. Folders
You can now create folders on the iPad to organize your apps into groups, tuck away the apps you don’t use as often, and save yourself from having to flip through an endless number of screens to find the app you’re trying to locate.

7. Unified inbox
The Mail app offers an improved interface that reminds me of the terrific email functionality on the Palm Pre. It gives you a quick jump directly to the inbox (new messages) of each of your multiple email accounts, or to your list of folders for those email accounts, or into a unified inbox where you can see all of your latest messages threaded together by timestamp. The 4.2 upgrade also now supports multiple Microsoft Exchange mailboxes.

8. Remote device management
Another development on the enterprise front is that the 4.2 upgrade offers Mobile Device Management APIs that allow companies to wirelessly push out configuration changes, monitor compliance with policies, and lock or wipe an iPad managed by the IT department. These features are aimed squarely at the companies deploying fleets of iPads to workers.

9. Web browser search on page
The web browser on the iPad has always had a search box for searching the Internet, but now Apple has added functionality to that box that allows you to use it to search for text on the current web page as well. This is especially useful when you do a web search and land on a page but can’t find the reference to the keyword you were looking for.

10. New quick controls console
If you click the Home button twice to go into multitasking and swipe to the panel on the left you’ll find a new quick control console that has a play/pause button and forward/back buttons for the iPod app, a volumne control slider, a brightness slider, and a new virtual orientation lock setting. The old physical orientation lock button (on the right side above the volumn buttons) has now been converted into a mute button

To view the original article in it’s entirety Click Here

Check Out These Tools to Help Safeguard Facebook Privacy

Hopefully, why you should never trust Facebook is obvious by now. Perhaps you feel like you still need it, though — or stubbornly refuse to believe it is really all that bad, whether because you think it is not much of a risk or just do not believe the evidence.

You may take all reasonable precautions, including using no personally identifiable or sensitive information in your account or profile data. Maybe you use a password and email address for the account that you use for nothing else, and refuse to communicate with anyone who actually knows any personally identifiable information or secrets about you on Facebook. Even so, there are risks.

Facebook clearly is not concerned with your privacy any more than the absolute minimum required to keep itself in business. There’s no such thing as a trusted brand, but there is certainly such a thing as a brand that is thoroughly suspicious — and Facebook seems to fit the description when it comes to personal privacy. Any time Facebook appears to care about your privacy, keep in mind that it took Congressional posturing to keep the corporation in line even to that small degree.

It is clear that even when Facebook offers something that looks like some kind of privacy protection, the offer is not a promise, and relying on it is a recipe for disappointment. With that in mind, the problem of protecting even the most minimal sense of privacy while using Facebook seems insurmountable. Thanks to the efforts of a number of hackers and entrepreneurs who actually care about privacy — not only theirs, but that of others as well, even if only because it serves as a convenient business model — there are some options that can help at least a little.

In no particular order:

1. SaveFace
Untangle offers the SaveFace bookmarklet, a script that can be saved as a bookmark in your browser. When you click a bookmarklet, it does “something” — usually involving whatever page you happen to be visiting at that moment. In the case of SaveFace, you can visit your Facebook page then click on the bookmarklet to rest your privacy settings to Private. According to Untangle, it currently covers Contact Information; Search Settings; Friends, Tags, and Connections; and Personal Information and Posts.

2. ReclaimPrivacy.org
A similar bookmarklet is offered by ReclaimPrivacy.org. Unlike SaveFace, the purpose of ReclaimPrivacy.org’s tool is to scan your Facebook settings and detect certain types of privacy vulnerabilities in your account settings. In theory, at least, it should be more thorough than SaveFace — but less automated as a means of protecting yourself.

3. Connect In Private
At ConnectInPrivate there is an annoying tablike thing floating over the left-hand side of the page. Take a closer look: it reads “Secure Your Facebook Profile”. If you click on that, it takes you to a Facebook application that offers a fairly comprehensive Facebook privacy feature set. Of course, what it provides is little more than a convenience layer over manually adjusting your own Facebook privacy settings, but it can be used for free and, if you like that kind of thing, you might find it valuable.

Using Connect In Private’s Facebook privacy scanner is a remarkably tedious and uncomfortable process for something so simple. It involves reading, and thinking about, a series of questions about what kind of privacy preferences you have — in ways that are poorly defined, and requiring Facebook account access that should make the average security concerned user hesitate. Access to the source code is not exactly a matter of easy access the way it is with the JavaScript in the ReclaimPrivacy.org bookmarklet and the .js page it references, either.

A final word
Connect In Private has one definite advantage over the other tools, though: it is more actively maintained. As of this writing, ReclaimPrivacy.org’s script is not compatible with current Facebook privacy settings, and there is a note on the page to that effect. SaveFace is far from a complete solution, for that matter. None of them are perfect, and there is always a risk if you trust your private data to a site like Facebook. Each of them might help a little, though.

In the end, I for one find it difficult to trust the Facebook application offered by Connect In Private. Your mileage may vary.

To read the original article in it’s entirety Click Here

Rogue Anti-Virus Software Explained

What Is Rogue Anti-virus Software?

It is almost unheard of in this day and age to be online without using anti-spyware and anti-virus software to safeguard your computer against viruses and other malicious code. It’s not surprising to see the prevalence of rogue anti-virus software.

Also called scareware, or rogue security software, or smitfraud, this type of software is also most commonly defined as malware—it is designed specifically to damage or disrupt your computer system. In this case, not only is the software going to disrupt your system, it’s going to try and trick you into making an unsecure credit card purchase.
Rogue anti-virus programs usually appears in the form of a fake Windows warning on your computer system that reads something like, you have a specific number of viruses on your computer (usually in the hundreds) and that this software has detected those viruses. To get rid of these viruses, you’re prompted to buy the full-version of the antivirus software (which is really rogue antivirus software).

The good news is that you probably do not have a computer that is infested with hundreds of viruses as the rouge software claims. The bad news is that the rogue antivirus software itself is on your computer and you must remove it. Removal is hindered as rouge software can lock the control panel and the the Add/Remove Programs function to prevent you from removing it easily.

Other things that may be disrupted by the rogue software include being unable to visit reputable and valid anti-virus and malware Web sites, being able to install legitimate antivirus software and also being unable to access your desktop.

The rogue software wants to stop users from removing the program and proceeding with the purchase instead. It’s important to remember that by purchasing the “claimed full version to remove the viruses” you will be submitting your personal information to unscrupulous persons and may also end up being a victim of credit card or identity theft.

Common names of rogue antivirus software include; AntiVirus (2007, 2008, and 2009), MS-Antispyware, XP AntiVirus (2007, 2008, and 2009), Home Antivirus 2009, SpyWareGuard, Malware Cleaner, Extra Antivirus, AV AntiSpyware, SpywareProtect2009, WinPC Defender as well as many other names.

How Does a Computer Get Infected with Rogue Antivirus Programs?
The reason these rogue anti-virus programs are successful (for the malicious coders) is because the warning screens very closely resemble legitimate Windows warning screens, plus the rouge software program names closely resemble or sound like legitimate antivirus programs.

When you load an infected Web site you might see a warning screen pop up and think that it is a legitimate Windows warning. Users unknowingly are tricked into downloading the software because they believe the warning to be a legitimate Windows messages.

You might also be on a Web site trying to view a video and a screen may pop-up telling you that you need to download a codec to view the file. The window prompting you to download the codec looks legitimate, however you are not going to download a codec—instead you will receive one of the many rogue antivirus software programs.

In April of this year, it was also reported that systems that had been previously infected with Conficker, found this worm had began installing rogue antivirus programs on infected machines. In the early cases this turned out to be a rogue application called SpywareProtect2009. Kaspersky researchers reported this was a typical rogue program that offered to clean the computer for $49.95.

Lastly, if you use file sharing networks you also risk downloading a rogue antivirus as it can be easily hidden inside a legitimate program—that you may or may not be legitimately downloading.
How to Spot Rogue Antivirus Warnings

For the most part, you need to look at the windows that are popping up and the name of the program being shown. If you know the program name of the antivirus and spyware software you use, then seeing a different name in the warning window is the first clue. Also, Windows itself doesn’t warn you of a virus. Legitimate warnings on your system would come from the anti-virus program you have installed, not a random Windows operating system style pop-up window. A great resource for learning how to spot these malicious programs through fake warning messages can be found on bleepingcomputer.com. This page lists the text of some of the more common false warning screens, including the following:

Malware Cleaner: Trojan detected! A piece of malicious code was found in your system that can replicate itself if no action is taken. Click here to have your system cleaned by Malware Cleaner.

AV AntiSpyware: Spyware Alert! Your computer is infected with spyware. It could damage your critical files or expose your private data on the Internet. Click here to register your copy of AV AntiSpyware and remove spyware threats from your PC.
How Do I Get Rid of Rogue Antivirus Programs?

It can be a difficult task to get rogue anti-virus programs off your computer. To complicate the matter, there are many variations of this malicious program and not all variants can be removed in the same way. This is not something that novice computer users may be able to deal with on their own.

Also, due to the popularity of these infections and people searching for answers on how to remove the program a number of scam programs also exist that lead users to believe it will remove the infection. Yes, these programs that claim to rid your system of Antivirus 2009 (or whichever variant you have been infected with) will scan your system and then prompt you for a credit card number so you can download a full version to remove the infection. Sound familiar? It should. This is a vicious cycle that users can unwittingly become trapped in.

Still, the good news is that in many instances you can get rid of the rouge antivirus program without wiping and formatting your hard drive. If you are already infected and you cannot access legitimate security related Web sites, you will need to download the following programs from a second computer and burn them to CD to run on the infected computer.

WARNING: Before running any of the following programs, you should turn off System Restore (you won’t be able to use System Restore as this deletes all restore points). If you don’t turn it off, the programs may not be able to access those system files to clean them. If you are infected the System Restore is not going to return you to an earlier uninfected date anyway. You can turn it back on after you have successfully removed the rouge antivirus program.

The quickest way, and first thing to try is to download Malwarebytes Anti-Malware to get rid of the rogue antivirus. On it’s own this will usually rid your computer of the problem. If Malwarebytes didn’t have the desired results, or you simply want to do a total and complete system clean, you will want to use a combination of CCleaner, Malwarebytes, Asquared, and SpyBot Search and Destroy. These programs all offer freeware versions.

NOTE: In some cases, the rogue anti-virus may block one or more of these legitimate programs. If this is the case, you will need to open the folder where you installed the program on your hard drive and rename the executable file (.exe) to anything other than the program’s name. (e.g. rename mbam.exe to aaa.exe).

Once you have run all the programs, be sure to go back and run CCleaner a final time to get rid of dead registry links from having the rouge antivirus removed. Continue to run the registry option of this program until no problems are found.

Here are additional removal resources:
bleepingcomputer.com: How to remove Extra Antivirus
bleepingcomputer.com: How to uninstall and remove AV AntiSpyware
bleepingcomputer.com: How to uninstall and remove WiniBlueSoft
bleepingcomputer.com: How to uninstall and remove HomeAntivirus 2009
bleepingcomputer.com: How to uninstall and remove Antivirus 2009 (Antivirus 09)
bleepingcomputer.com: How to uninstall and remove PAntispyware09
bleepingcomputer.com: How to uninstall and remove Virus Sweeper
bleepingcomputer.com: How to uninstall and remove WinPC Antivirus
Kaspersky Technical Support and Knowledge Base: How to disinfect rogue spyware

DID YOU KNOW…

In December 2008 it was reported that a Google sponsored link pointed to a malicious Web site where users were redirected to a spoofed CNET Download.com site with offers to download a “spyware free” copy of Winrar. This file included the rogue antivirus program “AntiSpyware2008” (Source)

CCleaner – Free System Optimization Download!

CCleaner
Optimization and Cleaning

Features
CCleaner is a free SJT recommended system optimization, privacy and cleaning tool. It removes unused files from your system – allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it’s fast (normally taking less than a second to run) and contains NO Spyware or Adware!

Cleans the following:

Internet Explorer
Temporary files, history, cookies, Autocomplete form history, index.dat.

Firefox
Temporary files, history, cookies, download history, form history.

Google Chrome
Temporary files, history, cookies, download history, form history.

Opera
Temporary files, history, cookies.

Safari
Temporary files, history, cookies, form history.

Windows
Recycle Bin, Recent Documents, Temporary files and Log files.

Registry Cleaner
Advanced features to remove unused and old entries, including File Extensions, ActiveX Controls, ClassIDs, ProgIDs, Uninstallers, Shared DLLs, Fonts, Help Files, Application Paths, Icons, Invalid Shortcuts and more… also comes with a comprehensive backup feature.

Third-party applications
Removes temp files and recent file lists (MRUs) from many apps including Media Player, eMule, Google Toolbar, Netscape, Microsoft Office, Nero, Adobe Acrobat, WinRAR, WinAce, WinZip and many more…

100% Spyware FREE
This software does NOT contain any Spyware, Adware or Viruses.

To download your free copy of this software Click Here

Microsoft Office 2010 and Microsoft SharePoint 2010 released

At the end of the day on April 16, Microsoft officials said Office 2010 and SharePoint 2010 were released today to manufacturing.

According to the company, more than 7.5 million people have downloaded the beta of the “2010 set of products” for the PC, mobile phone and browser. That’s more than three times the number of individuals who tested Office 2007, company officials said in a post to the Office 2010 Engineering blog.

MSDN and TechNet subscribers will be able to download the final bits starting April 22, company officials said.

Volume licensees with Software Assurance for these products will be able to download them in English from the Volume Licensing Service Center on April 27. Customers without SA will be able to get these products through the VLSC starting May 1.

The launch of Office 2010 is on May 12 in New York City. Virtual launch events also kick off that day. Office 2010 will be available in retail stores in June in the U.S.

Article located here to read more.