Tim Kas

Tim Kas

Computer security specialist. I try to do my best and share my knowledge with you by creating simple-to-follow and useful guides on various topics about computer security.

How to uninstall (remove) Go.normandoh.com

Go.normandoh.com is a fake search engine that comes to your computer without user consent in the form of a browser extension for Chrome, Mozilla, and IE. At first glance, this search engine has a positive effect, reminding popular analogs, has a nice interface, and also promises to improve the effectiveness of browsing. In reality, this search page is useless.

How to uninstall (remove) Hao.169x.cn

Hao.169x.cn is a browser hijacker that looks like a search engine and comes bundled with freeware without your knowledge. Hao.169x.cn hijacks popular browsers such as Google Chrome, Mozilla Firefox and Internet Explorer. The difficulty is that the page and all the extensions that appear later in Chinese, so it is very difficult to make changes to the settings of extensions and so on.

How to remove Iron Ransomware and decrypt .encry files

Iron Ransomware, also known as Iron Locker, Iron Unlocker Ransomware, Maktub Ransomware, is malware file encryptor, which locks users documents, photos, videos and other files using AES + RSA for the key, and then cybercriminals demand a 0.2-1.1 Bitcoins for decryption. In fact, real decryption is not guaranteed after payment. Ransomware virus creates a unique id for every infiltrated machine.

How to uninstall (remove) Search.funsocialtabsearch.com

Search.funsocialtabsearch.com is a browser hijacker, which changes a homepage to http://search.funsocialtabsearch.com. Despite a modern design and useful links on most popular social networks, such a twitter, facebook, etc Search.funsocialtabsearch.com can decreases system performance and quality of browsing. It's because fake search engine, that brings by a hijacker and modifies browser settings in most popular browsers: Google Chrome, Mozilla Firefox, and Safari. Browser hijacker can collect and a personal user information and share it with third parties: retailers or markets.