Showing posts with label Virus. Show all posts
Showing posts with label Virus. Show all posts
Tuesday, November 22, 2011
Tuesday, July 5, 2011
Download Your free trial of Kaspersky PURE Total Security.
Tuesday, June 14, 2011
How To Avoid Virus Infection On Windows Computer in 3 Simple Steps
Viruses are malicious programs that can run down your entire system and leak your private data into the wrong hands. What about you system’s performance after been infected by viruses? How right can a computer perform in the presence of viruses? Your computer cannot be as right as it ought to be when there are viruses in your computer. The performance of your computer will deteriorate as soon as it is infected with viruses and by this time you fall on the brink of losing the entire documents and files on your computer. Many people have been hacked and have loosed their paypal and email accounts to hackers due to the presence of viruses and spywares on their computer. Some viruses that seem to look harmless are the most dangerous; some viruses pose as antivirus and upon installing them on your computer you then begin to experience difficulties with your computer: such as applications mysteriously ending while in use, your browser directing you to harmful sites etcetera, etcetera. I shall be explaining some few tips on how to protect your computer against virus attack. Antivirus programs are developed to protect your system against virus attacks of all forms. Antivirus programs neutralizes any virus or spyware that gets into your computer; an antivirus can clean your computer if there are viruses on it and also disarm those that come along with files that are copied from flash drives and attachments from your email box. When you are installing an antivirus, you should make sure the antivirus you are installing is a well trusted and widely used by many computer users. You can easily purchase an antivirus program in the market while you can also get it for free if you care to use the free ones. After installing an antivirus on your system, your system might still be visited by viruses if the antivirus you are using is not regularly updated. For your antivirus program to perform well for you, you have to update it regularly and frequently run a system scan. The fact that an antivirus is installed on your computer does not mean a virus can’t find its way into your computer, you can only assume that you are fully protected when you antivirus program is kept updated regularly. When downloading files and applications from the internet to your computer system make sure the sites you are downloading from are trustworthy sites. If you want to know the rank or the quality of websites you are downloading from you can install alexa toolbar on your web browser by visiting. |
Tuesday, May 31, 2011
How To Unhide Files & Folders Hidden by Virus from USB Drives?
Some viruses are designed to infect and hide the files at the same time. Antivirus software are able to clean them but are not able to make them back visible in most of the cases.
I’m one of those who have encountered this dozens of times. After searching a bit over internet, I found different tricks and apps to unhide the hidden folders when it’s not possible to unhide through files or folder properties. But from all them, USB show is the one which, in my point of view, is the fastest, working and most effective solution of all.
USB Show is a lightweight but very powerful little app that allows you to unhide files and folder from any drive in just a click of a button. You can use this on hard drives partitions as well and it doesn’t require any installation. To use it, just run the application and hit “Recover the Hide File”, then browse for the drive and give the tiny app a few seconds to find an recover hidden and effected files and folders.
Thanks to mrsupport
Monday, December 6, 2010
Best free Light weight antivirus program
Recently one of my not so geeky friend asked me which is free antivirus program available in the market with decent detection and protection rate against malware, spyware and all kind of viruses, and block threats while surfing/browsing and also does not consume much system resource as his system was 5 years old? i was like wait a minute! aint he asking qualities of antivirus which are available only in paid version :) ?
I was using kaspersky from last 4 years and the license expired 3 months ago since then my computer is bare without any AV, so i thought to look for a free alternative this time because most of the time i will be careful on the sites i open and my requirements was just a basic protection similar to any average joe.
So after a lots of research i found three free antivirus "AVG FREE", "AVIRA", "AVAST" to be heavily discussed and debated on many forums , weblogs and websites as the best free alternative AV, though above promises protection to some extent but each one has its pros and cons, but i used all these before for few weeks and i know they have big foot print in terms of consumption of CPU resource.
So whats the best alternative? Microsoft released a free anti virus called "Microsoft Security Essentials" in late 2009 but unfortunately many don't know about it, its very light and does not cripple PC performance and can give a decent protection against viruses, spyware and malwares.
It has the easy to use unbloated interface without unnecessary features and settings, its like install and forget type application, but beware you have to pass WGA to get it installed and i know you guys know what to do for it :), and it automatically updates itself without any niggles and has less foot print takes around 40MB and very lite even compared to my previous AV (KASPERS SKY) which was a bit heavy and consuming fair amount of time at bootup, MS SECURITY ESSENTIALS IS best suited for less tech savy professionals and average joe who requires basic protection.
Whats more its free, it doesn't have any PRO or PAID versions and no need to worry about License and upgrades you can download it here .
I am using it from about three months before writing this post i did not find any lag in the system, infact the system performance is so good and browsing speed is so great i feel that there is no ANTI VIRUS in my computer, in last one week it blocked one virus and quarantined it, so far great i am still testing it, if you guys have tested MS SE before Commenting and sharing your experience will do good.
Source: Need to Know
Friday, November 12, 2010
How to disable USB Mass storage device in your system
Most virus infections are due to USB pen drives. Here is small registry tool to disable USB Mass storage devices to be used on system. Before using this Backup your Registry. REGEDIT > FILE MENU > EXPORT to a safe place.
Use attached file to Disable or Enable USB mass storage devices.
Source: dop systemadministrators
Saturday, September 25, 2010
Something fishy going on over the past few hours. A large number of Orkut users are randomly flooding their friend’s scrapbooks with following message:
Something fishy going on over the past few hours. A large number of Orkut users are randomly flooding their friend’s scrapbooks with following message:
"Bom sabado"
It doesn’t take a genius to figure out that the “Bom Sabado!” messages are automatically generated by a script. However, it is not clear if this is simply a script exploiting vulnerability in Orkut, or have the accounts sending the automated scraps been compromised.
If you are amongst those affected, it’s highly recommended that you follow the steps highlighted below:
Switch to the “older version” of Orkut.
Log out of Orkut.
Clean your browser’s cache and cookies.
Log in and change your password and security question.
If you haven’t been affected yet, it is strongly advised that you avoid Orkut until the issue has been resolved.
Update 1: The worm appears to have originated in Brazil, where Orkut is still exceptionally popular. Many of the affected users are noticing the Brazilian flag on their status messages. Additionally, the word ‘Bom Sabado’ means ‘Good Saturday’ in Portuguese, which is the official language of Brazil.
--
Kiran Reddy
"Bom sabado"
It doesn’t take a genius to figure out that the “Bom Sabado!” messages are automatically generated by a script. However, it is not clear if this is simply a script exploiting vulnerability in Orkut, or have the accounts sending the automated scraps been compromised.
If you are amongst those affected, it’s highly recommended that you follow the steps highlighted below:
Switch to the “older version” of Orkut.
Log out of Orkut.
Clean your browser’s cache and cookies.
Log in and change your password and security question.
If you haven’t been affected yet, it is strongly advised that you avoid Orkut until the issue has been resolved.
Update 1: The worm appears to have originated in Brazil, where Orkut is still exceptionally popular. Many of the affected users are noticing the Brazilian flag on their status messages. Additionally, the word ‘Bom Sabado’ means ‘Good Saturday’ in Portuguese, which is the official language of Brazil.
--
Kiran Reddy
Friday, July 30, 2010
Virus Science by Kiran Kishore, Andheri
Adware
Adware is software that presents banner ads or in pop-up windows through a bar that appears on a computer screen. Those advertising spots usually can’t be removed and are consequently always visible. The connection data allow many conclusions on the usage behavior and are problematic in terms of data security.
Backdoors
A backdoor can gain access to a computer by going around the computer access security mechanisms.
A program that is being executed in the background generally enables the attacker almost unlimited rights. User’s personal data can be spied with the backdoor’s help, but are mainly used to install further computer viruses or worms on the relevant system.
Boot viruses
The boot or master boot sector of hard drives is mainly infected by boot sector viruses. They overwrite important information necessary for the system execution. One of the awkward consequences: the computer system cannot be loaded any more…
Bot-Net
A Bot-Net is collection of softwarre bots, which run autonomously. A Bot-Net can comprise a collection of cracked machines running programs (usually referred to as worms, Trojans) under a common command and control infrastructure. Boot-Nets server various purposes, including Denial-of-service attacks, etc.., partly without the affected PC user’s knowledge. The main potential of Bot-Nets is that the networks can achieve dimensions on thousands of computers and its bandwidth sum bursts most conventional Internet accesses.
Dialer
A dialer is a computer programm that establishes a connection to the Internet or to another computer network through the telephone line or the digital ISDN network. Fraudsters use dialers to charge users high rates when dialing up to the Internet without their knowledge.
EICAR test file
The EICAR test file is a test pattern that was developed at the European Institute for Computer Antivirus Research for the purpose to test the functions of anti-virus programs. It is a text file which is 68 characters long and its file extension is “.COM” all virus scanners should recognize as virus.
Exploit
An exploit (vulnerability) is a computer program or script that takes advantage of a bug, glitch or vulnerability leading to privilege escalation or denial of service on a computer system. A form of an exploit for example are attacks from the Internet with the help of manipulated data packages. Programs can be infiltrated in order to obtain higher access.
Grayware
Grayware operates in a way similar to malware, but it is not spread to harm the users directly. It does not affect the system functionality as such. Mostly, information on the patterns of use is collected in order to either sell these data or to place advertisements systematically.
Hoaxes
The users have obtained virus alerts from the Internet for a few years and alerts against viruses in other networks that are supposed to spread via email. These alerts are spread per email with the request that they should be sent to the highest possible number of colleagues and to other users, in order to warn everyone against the “danger”.
Honeypot
A honeypot is a service (program or server), which is installed in a network.
It has the function to monitor a network and to protocol attacks. This service is unknown to the legitime user – because of this reason he is never addressed. If an attacker examines a network for the weak points and uses the services which are offered by a Honeypot, it is protocolled and an alert sets off.
Keystroke logging
Keystroke logging is a diagnostic tool used in software development that captures the user’s keystrokes. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. Like this, confidential and personal data, such as passwords or PINs, can be spied and sent to other computers via the Internet.
Macro viruses
Macro viruses are small programs that are written in the macro language of an application (e.g. WordBasic under WinWord 6.0) and that can normally only spread within documents of this application. Because of this, they are also called document viruses. In order to be active, they need that the corresponding applications are activated and that one of the infected macros has been executed. Unlike “normal” viruses, macro viruses do consequently not attack executable files but they do attack the documents of the corresponding host-application.
Polymorph viruses
Polymorph viruses are the real masters of disguise. They change their own programming codes – and are therefore very hard to detect.
Program viruses
A computer virus is a program that is capable to attach itself to other programs after being executed and cause an infection. Viruses multiply themselves unlike logic bombs and Trojans. In contrast to a worm, a virus always requires a program as host, where the virus deposits his virulent code. The program execution of the host itself is not changed as a rule.
Scareware
The term scareware refers to software which has been designed with the intent to cause anxiety or panic. The victim could be tricked and feels threatened and usually accepts an offer to pay and have the inexistent threat removed. In some cases the victim is seduced to cause the attack himself by making him think this intervention will successfully remove the threat.
Script viruses and worms
Such viruses are extremely easy to program and they can spread – if the required technology is on hand – within a few hours via email round the globe.
Script viruses and worms use a script language such as Javascript, VBScript etc. to infiltrate in other new scripts or to spread by activation of operating system functions. This frequently happens via email or through the exchange of files (documents).
A worm is a program that multiplies itself but that does not infect the host. Worms can consequently not form part of other program sequences. Worms are often the only possibility to infiltrate any kind of damaging programs on systems with restrictive security measures.
Security Privacy Risk (SPR)
The term “SPR/” (“Security or Privacy Risk”) refers to a program which can damage the security of your system, trigger program activities you do not want or harm your private environment.
Spyware
Spyware are so called spy programs that intercept or take partial control of a computer’s operation without the user’s informed consent. Spyware is designed to expolit infected computers for commerical gain. Typical tactics furthering this goal include delivery of unsolicited pop-up advertisements. AntiVir is able to detect this kind of software with the category “ADSPY” or “adware-spyware” .
Trojan horses (short Trojans)
Trojans are pretty common nowadays. We are talking about programs that pretend to have a particular function, but that show their real image after execution and carry out a different function that, in most cases, is destructive. Trojan horses cannot multiply themselves, which differenciates them from viruses and worms. Most of them have an interesting name (SEX.EXE or STARTME.EXE) with the intention to induce the user to start the Trojan. Immediately after execution they become active and can, for example, format the hard drive. A dropper is a special form of Trojan that ‘drops’ viruses, i.e. embeds viruses on the computer system.
Zombie
A Zombie-PC is a computer that is infected with malware programs and that enables hackers to abuse computers via remote control for criminal purposes. The affected PC, for example, can start Denial-of-Service- (DoS) attacks at command or send spam and phishing emails.
Adware is software that presents banner ads or in pop-up windows through a bar that appears on a computer screen. Those advertising spots usually can’t be removed and are consequently always visible. The connection data allow many conclusions on the usage behavior and are problematic in terms of data security.
Backdoors
A backdoor can gain access to a computer by going around the computer access security mechanisms.
A program that is being executed in the background generally enables the attacker almost unlimited rights. User’s personal data can be spied with the backdoor’s help, but are mainly used to install further computer viruses or worms on the relevant system.
Boot viruses
The boot or master boot sector of hard drives is mainly infected by boot sector viruses. They overwrite important information necessary for the system execution. One of the awkward consequences: the computer system cannot be loaded any more…
Bot-Net
A Bot-Net is collection of softwarre bots, which run autonomously. A Bot-Net can comprise a collection of cracked machines running programs (usually referred to as worms, Trojans) under a common command and control infrastructure. Boot-Nets server various purposes, including Denial-of-service attacks, etc.., partly without the affected PC user’s knowledge. The main potential of Bot-Nets is that the networks can achieve dimensions on thousands of computers and its bandwidth sum bursts most conventional Internet accesses.
Dialer
A dialer is a computer programm that establishes a connection to the Internet or to another computer network through the telephone line or the digital ISDN network. Fraudsters use dialers to charge users high rates when dialing up to the Internet without their knowledge.
EICAR test file
The EICAR test file is a test pattern that was developed at the European Institute for Computer Antivirus Research for the purpose to test the functions of anti-virus programs. It is a text file which is 68 characters long and its file extension is “.COM” all virus scanners should recognize as virus.
Exploit
An exploit (vulnerability) is a computer program or script that takes advantage of a bug, glitch or vulnerability leading to privilege escalation or denial of service on a computer system. A form of an exploit for example are attacks from the Internet with the help of manipulated data packages. Programs can be infiltrated in order to obtain higher access.
Grayware
Grayware operates in a way similar to malware, but it is not spread to harm the users directly. It does not affect the system functionality as such. Mostly, information on the patterns of use is collected in order to either sell these data or to place advertisements systematically.
Hoaxes
The users have obtained virus alerts from the Internet for a few years and alerts against viruses in other networks that are supposed to spread via email. These alerts are spread per email with the request that they should be sent to the highest possible number of colleagues and to other users, in order to warn everyone against the “danger”.
Honeypot
A honeypot is a service (program or server), which is installed in a network.
It has the function to monitor a network and to protocol attacks. This service is unknown to the legitime user – because of this reason he is never addressed. If an attacker examines a network for the weak points and uses the services which are offered by a Honeypot, it is protocolled and an alert sets off.
Keystroke logging
Keystroke logging is a diagnostic tool used in software development that captures the user’s keystrokes. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. Like this, confidential and personal data, such as passwords or PINs, can be spied and sent to other computers via the Internet.
Macro viruses
Macro viruses are small programs that are written in the macro language of an application (e.g. WordBasic under WinWord 6.0) and that can normally only spread within documents of this application. Because of this, they are also called document viruses. In order to be active, they need that the corresponding applications are activated and that one of the infected macros has been executed. Unlike “normal” viruses, macro viruses do consequently not attack executable files but they do attack the documents of the corresponding host-application.
Polymorph viruses
Polymorph viruses are the real masters of disguise. They change their own programming codes – and are therefore very hard to detect.
Program viruses
A computer virus is a program that is capable to attach itself to other programs after being executed and cause an infection. Viruses multiply themselves unlike logic bombs and Trojans. In contrast to a worm, a virus always requires a program as host, where the virus deposits his virulent code. The program execution of the host itself is not changed as a rule.
Scareware
The term scareware refers to software which has been designed with the intent to cause anxiety or panic. The victim could be tricked and feels threatened and usually accepts an offer to pay and have the inexistent threat removed. In some cases the victim is seduced to cause the attack himself by making him think this intervention will successfully remove the threat.
Script viruses and worms
Such viruses are extremely easy to program and they can spread – if the required technology is on hand – within a few hours via email round the globe.
Script viruses and worms use a script language such as Javascript, VBScript etc. to infiltrate in other new scripts or to spread by activation of operating system functions. This frequently happens via email or through the exchange of files (documents).
A worm is a program that multiplies itself but that does not infect the host. Worms can consequently not form part of other program sequences. Worms are often the only possibility to infiltrate any kind of damaging programs on systems with restrictive security measures.
Security Privacy Risk (SPR)
The term “SPR/” (“Security or Privacy Risk”) refers to a program which can damage the security of your system, trigger program activities you do not want or harm your private environment.
Spyware
Spyware are so called spy programs that intercept or take partial control of a computer’s operation without the user’s informed consent. Spyware is designed to expolit infected computers for commerical gain. Typical tactics furthering this goal include delivery of unsolicited pop-up advertisements. AntiVir is able to detect this kind of software with the category “ADSPY” or “adware-spyware” .
Trojan horses (short Trojans)
Trojans are pretty common nowadays. We are talking about programs that pretend to have a particular function, but that show their real image after execution and carry out a different function that, in most cases, is destructive. Trojan horses cannot multiply themselves, which differenciates them from viruses and worms. Most of them have an interesting name (SEX.EXE or STARTME.EXE) with the intention to induce the user to start the Trojan. Immediately after execution they become active and can, for example, format the hard drive. A dropper is a special form of Trojan that ‘drops’ viruses, i.e. embeds viruses on the computer system.
Zombie
A Zombie-PC is a computer that is infected with malware programs and that enables hackers to abuse computers via remote control for criminal purposes. The affected PC, for example, can start Denial-of-Service- (DoS) attacks at command or send spam and phishing emails.
Subscribe to:
Posts (Atom)