Information systems

  • Beranda
  • Blogging
    • Template
    • Blogging
  • Downloads
    • Software
    • Game
  • Blogging
  • Template
  • SSH Gratis
Home → Semua Post

worm virus

Add Comment
01.59
Worm Viruses, Deadliest Of All



Of the three most common types of malware (malware is short for malicious software, i.e. designed to harm) - viruses, Trojans and worms - the latter is the most harmful because only worms can function without human intervention. 

Worms, like viruses, replicate themselves but unlike viruses are completely self-contained. Viruses need a 'host program' to spread, but worms propagate independently.

Though they can be designed to do the same kind of harm (file deletion, program corruption, etc), worms usually affect networks. Networks operate by means of servers and routers. The Internet is just a large set of mutually cooperating public computer networks.

Servers are similar to PC's, though usually faster and with more storage and other resources. They 'serve' other systems by making those resources available to multiple users. Routers are just specialized servers, typically of different hardware and operating systems, used to route network traffic. Hence the name.

Worms can be released into a network and their self-replication behavior causes damage. Since routers use memory, processor time, etc worms - like viruses - can overwhelm them, causing them to slow down and become unstable. Viruses don't have to delete files to do harm, they can cause the CPU - central processing unit, used to run programs - to be constantly busy. That leaves no resources for other programs to run.

Worms often carry 'payloads' - other types of malware such as spyware or backdoor installation programs. Spyware is used to monitor your computer activities and backdoors are hidden access points to your computer which can be exploited by hackers to send spam or steal data from your computer.

The fastest spreading worm ever was 'MyDoom'. First released in January 2004, it was distributed by e-mail and contained the message "andy; I'm just doing my job, nothing personal, sorry."

The author was never been discovered, but many believe it was designed to attack software company SCO (Santa Cruz Operation). Programmed to flood SCO's web site with Internet traffic, it quickly spread to the Internet at large causing a world-wide slowdown.

For individual computer users, the worm's payload is the biggest threat. Payloads can be designed to work around computer security by turning off antivirus functions or opening up computer ports. Ports are used by network software to move data in and out. Once done, the computer is open to data theft or malicious acts such as deleting files.

De-Worming

Firewalls are moderately effective in protecting your computer against worms. They can be set up to restrict network traffic and can help to 'cloak' your computer. If your computer can't be 'seen' it can't be infected with worms which spread over networks.

However, worms are also distributed in e-mail attachments so use caution when opening mail from unknown recipients or when someone known sends unexpected files.

Despite your best precautions, your system may become infected. You may notice your computer acting sluggish or rebooting on its own. Internet access may become very slow.

If you suspect your computer is infected with a worm, scan your system with antivirus software. If it fails to remove the worm, instructions for manual removal can be found on the Internet.

fight virues

Add Comment
01.56
Two simple precautions can help keep your computer virus free - install and use software from reliable vendors and avoid opening unexpected e-mail attachments.
Almost all e-mail attachments are potential virus carriers. Some of the most famous viruses were distributed by accessing address books of infected computers and sending e-mail (with attachments) to everyone in the address book.

Even those from known senders should be regarded with suspicion - e-mail addresses can easily be faked to appear to be from someone you know.

The 'Melissa' virus that appeared in 1999, originally posted on an Internet newsgroup, was distributed in a Microsoft Word document. When downloaded and opened the virus accessed the user's address book and sent copies of the document (along with the virus) to the first 50 people in the user's address book.

Every computer that received the virus sent out an additional 50 copies, creating a worldwide slowdown in Internet networks. The effect took only a few hours.

Another widespread virus distributed by e-mail was the 'ILOVEYOU' virus of 2000. When double clicked it sent copies of itself to every e-mail address in the infected computers address book. But far from a problem of the past, viruses are still very much with us.

What to do?

ANTIVIRUS SOFTWARE 

Antivirus software is available in both commercial and freeware versions with a variety of features and prices, usually from free to less than $50.

Most antivirus software works by examining files as they arrive at the computer and by scanning later at configurable pre-set times. The programs work by examining each e-mail attachment and downloaded file looking for virus 'signatures'.

If a virus is found the user will be alerted and infected programs and attachments can be cleansed of the virus or, if not possible, infected files can be deleted or placed into 'quarantine' where they can't be run.

UPDATES

Whare are signatures? All programs have instructions in a pattern. Computer viruses - like their biological counterparts - come in known, though evolving, patterns. The fact of evolution is the reason virus-checking files need to be regularly updated. Updated files contain lists and the characteristics of new signatures.

Most antivirus software can be configured to alert you when the virus checking files are out of date, and even to automatically refresh signature files with the latest versions.

USER PARTICIPATION

Users can become complacent after installing antivirus software, thinking they're totally protected and don't need to worry about becoming infected.

Apart from the fact that antivirus software is written by humans, who can make errors, vendors can only react to viruses after they're created. By that time, much damage can already have been done. An e-mail attachment or program may be infected with a new type of virus that your software cannot (yet) detect.

Some antivirus software can - to a limited extent - detect virus activity even without being able to identify a particular virus. This is an extra level of protection against the latest viruses, but still shouldn't allow users to become overconfident. 

Always use trusted sources for downloading software and treat every e-mail attachment with caution.

OTHER INFECTION ROUTES

Lastly, a special note about CDs and DVDs. While they can't be written to (those that can are called CD-R's, DVD-R/W or some variation), they can still contain viruses. Users who burn their own CDs or DVDs - inexpensive and easy these days - can accidentally copy infected programs onto the disc. Since CDs can contain files that automatically act when the disc is inserted, it's possible - though rare - for viruses to be spread without additional user action.

Once again, the lesson is clear. Only accept material from those you know and trust, and who practice 'safe file sharing'.

Be safe out there, now.

what is a virus computer

Add Comment
01.53
What Is A Computer Virus, Anyway?


Combating infections and removing viruses is now big business. Lesson one is 'knowing the enemy'.

THE ENEMY - Crackers and Hackers

Geeks make a distinction between crackers, who break into systems to do damage, and hackers who enjoy taking programs apart just to see how they tick. We'll stick with the more common, though less accurate, term of hacker. (The term 'hacker' originally meant 'someone who makes furniture' with an axe. Crude, but effective - like most computer viruses.)

Viruses are actually a particular type of computer 'malware' - a general term covering all types of malicious software. The most common types are viruses, worms and Trojan horses.

VIRUSES

A virus is usually hidden inside another program such as an installation program delivered via e-mail attachment. (Biological viruses require a host organism to live and reproduce, hence the name.) When the 'host' program is run, the virus program also runs. Once it's in memory the virus is able to do its dirty work, which usually includes infecting other programs.

After the infection stage of the virus, there's a destructive stage. The virus waits for a pre-determined trigger (such as a specific date or a certain number of times the virus has replicated itself) before delivering its 'payload'. Payloads range from simple messages to file deletion commands to destruction of the core operating system.

When first developed, computer viruses were commonly distributed on floppy disks. With the growth of the Internet downloaded files and e-mail are the preferred delivery mechanisms. E-mail can contain attachments which can be any kind of computer file. Any executable file can be infected with a virus, and shouldn't be run unless you're confident they're virus free. 

WORMS

Worms are similar to viruses in that they're self-replicating. They reproduce themselves across networks without human assistance, such as e-mail sending. A worm, though, doesn't need another executable program to be distributed.

Worms usually affect networks more than individual computers on the network. Their self-replicating behavior can overload network resources, causing slowdowns in data transmission by consuming massive bandwidth normally used to forward normal traffic. Network systems that route Internet traffic are just specialized computer hardware and software. They, too, can be affected by malware.

Worms can also be designed to carry a payload, using a 'backdoor' installation program. A backdoor is a hidden access point to a computer that bypasses the normal login procedure. They're commonly used by spammers to distribute junk e-mail, for example.

TROJAN HORSES

Trojan horses are the third common type of malware. A 'trojan' is a program that pretends to do one thing but actually does something different. (The term comes from the story of the Greeks who built a large wooden horse in which to hide. Their enemies, the Trojans persuaded they'd receive a gift, took the horse inside their compound giving the Greeks easy access to wreak havoc.) Unlike viruses or worms, a Trojan doesn't replicate itself.

Trojans may be hidden in otherwise useful software. Once started they can do almost anything including erasing data, corrupting files, installing backdoors and logging keystrokes so that hackers can steal information such as credit card numbers and passwords.

FIGHTING MALWARE

Elsewhere in the series, we'll discuss what is and can be done to combat the spread of malware. In the interim, just remember not to be passive and expect the problem to be solved by others. Fighting viruses requires active participation from vendors, webmasters AND users.

control spyware infection

Add Comment
01.49
Control Spyware Infection Or You'll Be Sorry Later


A spyware is a malware that monitors the activities on the computer it is illegally installed in without the knowledge of the computer user. The information is sent back to its creator. Examples of information it collects are passwords and credit card numbers. 

Some spyware programs are designed to monitor the user's surfing habits, like what websites are often visited by the user and the software used as well as other personal information that the user might consider confidential. Some spyware functions as keyloggers and records keyed in passwords. 

The illegally-gotten information through spyware gives the creator a lot of benefits. One of the benefits is a wide database of supposed to be opt in list, a prized asset of internet marketers. Passwords give them access to big amounts of money from e-currency accounts. 

Signs Of Spyware On Your Computer

How does a computer user know that there is spyware lurking around, collecting confidential information? What are the sighs to watch out for? Here are some of the strange behaviors of a computer with spyware: 

1. The home page changes on its own

2. Strange toolbars that you haven't installed appear on the desktop. 

3. More pop ups even inspite of a pop up blocker. 

4. Sudden computer crash

5. Navigating difficulties.



How To Control Spyware Infection

You suspect , based on the computer's strange behavior that there is spyware on the computer. What should be the next course of action? Well, luckily, there is free software available to check and detect if any spyware is present. 

If there is indeed a spyware, there are also available tools to remove the spyware. To prevent or lessen spyware infection, here are some tips:

1. Have the necessary anti-malware tools installed. There are really effective tools available online for free which could provide protection if checking is religiously performed.

2. Be careful in downloading unverified programs or software and other freebies. Usually, there is a spyware hiding somewhere. 

3. Check the programs running in your system. Check the systems tray regularly. 

4. Ask for advice from the experts on the subject. There are many forums where members are generous in giving advice to those who need it. 

The best way to protect the computer from spyware is to prevent its entry into the computer. It is a must that the computer user educates himself or herself to know how to use the needed tools. Protection is the best way to prevent these malwares from creating trouble.

the best password

Add Comment
01.44
Choose The Best Password: The Key To Your Account


The password for the various protected internet/computer accounts is a set of characters, in a specific sequence and case sensitive. Together with the unique user name or ID, the password confirms that the user or person trying to access the account is the real one. The user name or ID is normally displayed or shown in the log in box or in the pages of the account but the password is supposed to be known only to the account user or owner and the system that runs the account. 

The minimum and maximum number of characters in a password depends also on the system set and it normally consists of letters in upper or lower cases, numbers and other characters. 
As the password is entered, it appears only as asterisks in the space provided so that its secrecy is maintained. 

The internet has really changed the ways things are done. Very important and secure transactions, like payments for purchases, banking as well as safekeeping and transfer of sensitive documents and other files are processed online. With the increase in online transactions, so are the number of cyber thieves who have developed techniques to crack the passwords. Most of the time, the account owner is to blame because the password isn't strong enough to ward off 'hackers" trying to break it. 

Choosing The Best Password

How do you choose the best password that is strong enough to withstand any attempts to access the account? Here are some tips in creating passwords: 

1. Don't use a password that is in the dictionary, even the foreign ones. There are password cracking software to determine the exact word in seconds. 

2. Don't use passwords that are associated to you like your maiden name, place of birth, Social Security number, children's names, phone numbers. Mix upper and lower case letters with numbers and other symbols allowed by the system like "miG67Ped." This would take a long time to guess and the "hacker" will most likely just leave and go to the next target. However, the account owner should make sure there is a way to remember the password. One way is to associate the words and numbers with easy-to-remember words, dates or names. The password could also be saved on a CD or USB and copied to the log in form. Keep any password record offline.

3. Don't use a password that is used on your other accounts.

4. Don't use commonly used passwords like " 12345678"

5. Use a password generating and auto-filling software. This will solve the problem of keyloggers taking note while the password is being entered and the problem of forgotten passwords. 

The password is like the secret key to a secured internet/computer account. Make sure it can really secure the account.

How To Block Pop-Up In Your PC

Add Comment
01.41
How To Block Pop-Up Ads In Your PC



Numerous online marketers and companies are aiming to maximize the use of the Internet. Because most consumers are getting online nowadays, various businesses are targeting catching the attention of prospective clients. Thus, as a sign of desperation, those marketers are launching pop-up advertisements.

Pop-up ads are very rampant and common. There are always pop-up ads appearing on your computer screen. Often, those unimportant and insignificant ads are annoying because they are hampering and blocking your computer usage. Here are some measures that will help you prevent or block pop-up ads.

- There are numerous pop-up ads blockers that can easily and conveniently be downloaded online. Basically, you should install any one of those blocking programs and run them so that on your next Internet log on, you will be spared form the hassles of pop-up ads. Most pop-up ads blockers are offered to the market for free from giant search engines like Google and Yahoo.

- If you are using Microsoft Corporation's popular Windows XP and Windows 2000, you can effectively block pop-up ads by installing on your personal computer Windows XP's Firewall or by updating into Windows XP SP2. Doing so will automatically block messenger service and messenger spam, which almost always constitutes pop-up ads.

- Download an anti-virus software that will at the same time function to detect and block different forms of pop-up ads arising from Spyware and Ad-ware. Such anti-virus programs aren't just helpful in keeping you protected from software virus. They are also effective in blocking pop-up ads that are most likely coming up with embedded viruses.

- Refrain from connecting to the online media without first running your firewall and your reliable anti-virus software. If you have installed a pop-up blocker, it will automatically function upon logging in to the Internet.

- Don't frequent websites that are known to spread and disseminate unnecessary pop-up ads. Usually, porn sites facilitate wide circulation of such ads. 

Overall, pop-up ads can be prevented by being vigilant and by being cautious when checking out different Websites. If you can help it, try to block and prevent such online ads from appearing on your PC screen. Pop-up ads not only disturb you from your online task; they also pose security and virus threats to your PC.

How To Protect Yourself

Add Comment
01.38
How To Protect Yourself From Phishing On The Internet



The Internet is regarded as the best place to do everything such as finding entertainment, shopping, or research, there's still the danger of anonymity. You may find yourself in another persons shoes, literally.

One example of the evils of the Internet is Phishing, which is a criminal method of obtaining your most personal information for the benefit of the evildoers. Some of their methods are stealing your password, credit card details, or even your identity.

It's easy to avoid being victimized by phishing. Here are some helpful advice on protecting yourself from these criminal activities.

Don't Give Your Personal Information To Anyone.

This is the most basic guide in avoiding phishing. This mostly applies to e-mail, private messages on bulletin boards/social networks or chatting with your online friends. They have identity thefts in social networking sites in which the criminal took advantage of the identity to obtain sensitive or personal information from other people.

If an e-mail message asks you to give your name, e-mail, password, credit card number, address, never reply to it, even if it seems like it's important. It might be one step to identity theft. So never, ever, give your personal information to anyone.

Create Strong Passwords

Simple phishing is to crack passwords of accounts. The easier the password you have on your account, the easier it will be cracked. A combination of numbers and letters is the ideal password for those who want their accounts to be protected.

Use Secure Online Payment Services

In shopping online, you have to determine if the payment service is secure. This is easy since you can research about how secure the payment service is on search engines or from friends. Remember that you will give your credit card number and other valuable information so it's better to have some background knowledge than none at all.

Avoiding Fake Websites

Web browsers such as Mozilla Firefox, Opera, and Internet Explorer have anti-phishing measures which detect fake websites. These fake websites could lure you into giving them your personal information and use them against you or for their own benefit. Some fake websites require you to which automatically give them your username and password. Double check if the URL is correct just to be sure you're in the right place.

Killing The Spam e-Mails

In most e-mails, there is a spam filter which automatically sends your spam in a different folder to be dealt with later. Spam e-mails are very dangerous and should be deleted immediately. The usual indication of spam is that it entices you to look inside with the subject and is usually from a person you don't know.

The Internet isn't the safest place in the world, even if you think you've covered all the bases. As long as you're lurking in there, the possibilities of crime are endless. So the key is just to be very careful.
Postingan Lebih Baru
Postingan Lama
Beranda
Langganan: Komentar (Atom)
  • Beranda
  • Sitemap
  • cara aktivasi windows vista

Translate

gampang banget cari duit disini Buruan... Daftar!!!

Entri Populer

  • cara menambah berat badan bayi dengan cepat
  • cari duit di enterupload
  • Windows 7 Start Button Changer 2.6
  • Playstation (PS) 2 in computer
  • Find Money Search Paid 2 dollars on Youtube
  • jual rumah ukuran luas 164m
  • Changing Localhost is the domain that we want [local computer]
  • cara memaksimalkan idm
  • idm 6.09 build 2 full version ( new )
  • idm 6.08 beta build 7 full version

Label

  • android (2)
  • Bengkel Windows (24)
  • Cari dolar tanpa modal (1)
  • Cari duit di blog (17)
  • Free Seo (20)
  • GPS (17)
  • Information (18)
  • Lowongan Kerja (11)
  • obat (2)
  • Smartfren Tips Trik (12)
  • Software (52)
  • Tips And Trick (43)

Arsip Blog

  • ▼  2014 (1)
    • ▼  Oktober (1)
      • cara mendapatkan pulsa gratis
  • ►  2013 (13)
    • ►  Mei (1)
    • ►  April (1)
    • ►  Maret (5)
    • ►  Februari (6)
  • ►  2012 (66)
    • ►  November (1)
    • ►  Juli (2)
    • ►  Juni (27)
    • ►  Mei (15)
    • ►  April (6)
    • ►  Maret (7)
    • ►  Februari (3)
    • ►  Januari (5)
  • ►  2011 (215)
    • ►  Desember (47)
    • ►  November (23)
    • ►  Oktober (2)
    • ►  September (2)
    • ►  Agustus (28)
    • ►  Juli (55)
    • ►  Juni (13)
    • ►  Mei (16)
    • ►  April (2)
    • ►  Maret (2)
    • ►  Februari (18)
    • ►  Januari (7)
  • ►  2010 (54)
    • ►  Desember (19)
    • ►  November (15)
    • ►  Juni (8)
    • ►  April (2)
    • ►  Februari (5)
    • ►  Januari (5)
  • ►  2009 (10)
    • ►  November (10)

Tags

Copyright 2014 Information systems
Template By Ridwan Hex And Game Gratis