{"id":419,"date":"2008-08-24T19:08:50","date_gmt":"2008-08-24T18:08:50","guid":{"rendered":"http:\/\/hlrnet.com\/technoblog\/?p=419"},"modified":"2020-11-07T21:29:14","modified_gmt":"2020-11-07T20:29:14","slug":"xp-antivirus-2008-valse-virusscanner","status":"publish","type":"post","link":"https:\/\/hlrnet.com\/technoblog\/inicio\/xp-antivirus-2008-valse-virusscanner\/","title":{"rendered":"XP Antivirus 2008: valse virusscanner"},"content":{"rendered":"<p>Nogal wat gebruikers hebben last van XP Antivirus 2008, een programma dat zich voordoet als virusscanner en meldt dat er problemen zijn. Het echte probleem &#8211; zoals bij alle valse virusscanners &#8211; is het programma zelf. Na het klikken op de\u00c2\u00a0 advertentie ziet er er zo uit:<\/p>\n<p><a href=\"http:\/\/hlrnet.com\/technoblog\/wp-content\/uploads\/2008\/08\/xp_antivirus_protection.png\" title=\"xp_antivirus_protection.png\"><img decoding=\"async\" src=\"http:\/\/hlrnet.com\/technoblog\/wp-content\/uploads\/2008\/08\/xp_antivirus_protection.thumbnail.png\" alt=\"xp_antivirus_protection.png\" \/><\/a><\/p>\n<p>Er is zeer degelijek achtergrondinformatie beschikbaar in <a href=\"http:\/\/www.theregister.co.uk\/2008\/08\/22\/anatomy_of_a_hack\/print.html\" target=\"_blank\" rel=\"noopener noreferrer\">Anatomy of a malware scam<\/a>.<br \/>\nNogmaals een oprope om alleen ernstige beveiligsprogramma&#8217;s te gebuiken. We hebben <a href=\"https:\/\/hlrnet.com\/sites\/virusbeveiliging\/\">hier<\/a> een lijst van degelijke virusccanners, en <a href=\"https:\/\/hlrnet.com\/sites\/internet-veiligheid\/\">hier<\/a> een van echte antispyware programma&#8217;s.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nogal wat gebruikers hebben last van XP Antivirus 2008, een programma dat zich voordoet als virusscanner en meldt dat er problemen zijn. Het echte probleem &#8211; zoals bij alle valse virusscanners &#8211; is het programma zelf. Na het klikken op de\u00c2\u00a0 advertentie ziet er er zo uit: Er is zeer<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":0,"footnotes":""},"categories":[16,32],"tags":[477,154],"class_list":["post-419","post","type-post","status-publish","format-standard","hentry","category-internet","category-security","tag-security","tag-virus"],"publishpress_future_action":{"enabled":false,"date":"2026-05-03 15:18:56","action":"delete","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/hlrnet.com\/technoblog\/inicio\/wp-json\/wp\/v2\/posts\/419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hlrnet.com\/technoblog\/inicio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hlrnet.com\/technoblog\/inicio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hlrnet.com\/technoblog\/inicio\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hlrnet.com\/technoblog\/inicio\/wp-json\/wp\/v2\/comments?post=419"}],"version-history":[{"count":0,"href":"https:\/\/hlrnet.com\/technoblog\/inicio\/wp-json\/wp\/v2\/posts\/419\/revisions"}],"wp:attachment":[{"href":"https:\/\/hlrnet.com\/technoblog\/inicio\/wp-json\/wp\/v2\/media?parent=419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hlrnet.com\/technoblog\/inicio\/wp-json\/wp\/v2\/categories?post=419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hlrnet.com\/technoblog\/inicio\/wp-json\/wp\/v2\/tags?post=419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}