Computer security (I)
Everyone knows the Internet is the hunting ground of pirates (hackers), and the prey of evil viruses, spyware (spyware) and spam others. Faced with serious consequences that their actions can be triggered for a company, all these Dell Inspiron 1525 battery forms of activities as crimes and punishment as such. We'll be back.
All Internet users who have been or may one day become a victim of the acts of these criminals, we will focus in this article on the operation and methods of protection against viruses, phishing, spam, spyware and other "social engineering". To avoid this article, we will detail the risks and threats to our IT infrastructure, system vulnerabilities and software and how it protects HP Pavilion ZD7000 battery itself in the article on the prevention of hacker attacks.
All the risks that threaten the security of our computer, the virus is the most common. What is a computer virus? This is an unwanted program that installs on your computer without your knowledge. Lines of instructions telling him how to act, to multiply and infect other programs and other computers.HP Pavilion DV2000 battery
As stated by Microsoft, a computer virus is a program of a few kilobytes. Worms like Slammer (aka Sapphire) are only 400 bytes.
Windows, a fertile environment for viruses
Note that once the prerogative of the environment of Windows virus has always been the main target of virus writers. In fact, you almost never have a virus or spyware related in environments such as Unix and Mac OS X or Linux. Why?
These are the operating system manages computer HP Pavilion DV9000 virus, do not take the hardware platform, Intel or PPC Mac, for example. So the fact, do not install an Intel CPU in a Mac to make it more susceptible to viruses and other malicious actions.
The security model of Unix Mac OS X will be assumed by default designed to protect the system against threats to platforms other rule. We can say that Mac OS X since the beginning,SONY VAIO VGN-AR830E battery was designed with safety in mind, knowing that the "zero risk" does not exist.
And in fact, there are some viruses that attack Mac, as "proof of concept" test virus as "OSX.Macarena" but they are not really there to destroy (their virulence your installation directory is limited, and they easily melted), but Dell Inspiron 5100 battery designers who can demonstrate environmental pollution.
It is, as Kaspersky, said in a report, not on Mac OS X is immune against the virus, only better protected against attacks. As proof, the end of 2007, the first Trojan (OSX.RSPlug.A) Apple has addressed and explained in this article. Now he can qualify for the security of Mac OS X. Stay tuned.
However, it is not the idea of ??installing a Windows partition on your Apple for example (via BootCamp), it would again open up your system for SONY VAIO VGN-FW350DH battery viruses and spyware.
Note that your system is just as vulnerable, if you have a virtualization software such as "Parallels Desktop" or another solution "Virtual PC for Mac" to use to create a Windows virtual machine on Mac OS X. However, Mac OS X partition will be protected forever.
Note that this attack very few viruses that can run multiple operating systems despite the differences inherent in any software architecture. This is the case of the virus "Bi.a" written in assembly language, which operate both Windows and Linux. But even here there is only a "proof of concept" not really malicious viruses. However, after Kaspersky and SANS, in the future more and more viruses of this strain to become virulent. This has already been infected with virus beam, Windows PCs and PDAs launched in February 2006. In short, no Toshiba PA3285U-3BRS battery platform is invulnerable, but some more than others ...
This vulnerability in the Windows environment and the price for some innate wide licenses, why in the space of a generation (1981-2007), he had a monopoly, Microsoft has seen its market share, reduced to less than 40 % in favor of Unix, Linux and other Mac OS X. At each of the lesson.
This clarification takes place, to describe in detail the functionality of any computer Toshiba PA3465U-1BRS battery viruses and how to eliminate them.
Dozens of new viruses are spread daily on the Internet, especially from the new republics of Eastern Europe, whose population is likely to be unemployed, but skilled Toshiba Satellite A10 battery and Western Europe (France, Southern England, Flanders, the Netherlands), the United States and the Far East.
In 1990, he was given 200-500 viruses under DOS with an average increase of 0.6 virus / day. Since then, the number of viruses has doubled every year with an acceleration of 1992. In the year 1996 exceeds the threshold of 10 000 virus. In 2000, there were 50,000 viruses.
List of viruses Kaspersky Today, almost 550,000 and 213,193 signatures. The software "NanoScan" Panda is able to identify more than one million signatures!
You can now ask whether the two anti-virus is as complete as the other, knowing that one has twice as many signatures as his opponent? The answer is "yes, probably" because it must be a comparison to be sure. We'll be back.
In fact, some Toshiba PA3107U-1BRS battery companies create a single signature virus, but it identifies many forms of viruses. So arbeitet and Kaspersky. In fact, transfer some worms (worms) and come in more than 400 varieties, as are many additional signatures! These polymorphic as "whales", a virus just 10 KB in 33 existing variants. In addition, a competitor for reasons of strategic business practices or as to create as many signatures as viruses and mutants, the total of an impressive number of signatures that can actually be two to five times higher than will be giving its competitors.
Also note that the virus is like nothing Kaspersky Virus List of encyclopedias encyclopedic list and make a small fraction of all existing viruses. Your best source of information are also Toshiba PA3399U-1BRS battery forums. We'll be back.
The elimination of viruses and other malware is an ongoing battle, as long as there are computer criminals will take. It is not for nothing that McAffee has chosen this name have you ever noticed that it means "make a fresh" subscribe, in other words, you buy our anti-virus software. In fact, the daily update ...
In November 1991, David M. Chess High Integrity HP Pavilion DV5000 battery Computing Laboratory IBM reported in the "Virus Bulletin" newspaper, about 30 viruses that were responsible for attacks around the world. Today they are the work of about 180 viruses, as explained WildList Observatory, which monitors the activity of the virus via the Internet.
Types of viruses
Are grouped into five major viral families. Boot virus in the boot sector of a hard disk that is read when the computer HP Pavilion ZT3000 starts to hide. These viruses replace the boot sector with a copy of itself and again the region of origin to another part of the disk. It goes without saying that even after formatting the hard drive, they are still there!
Then came the large family of viruses, the application executable (. Exe,. Com,. Sys. Inf. Dll. Vbs, etc) to infect. They replace the startup file before the infected program is started and then they make him incognito, hiding the hand and running in the background. It's pretty vicious, but the behavior of the virus! Currently, the virus can not see the images (. JPG,. GIF), sound files (. WAV. MP3, etc) or video files (. MPEG, etc), but it's probably a matter of time.HP 510 battery
There are also macro viruses (macro viruses), the tabernacle of macros in Office applications like Word or Excel and e-mail viruses to interfere with the mail.
Finally, the worm (worm) is a virus, through the network and spreads message and therefore no physical or logical (or hard drive or folder, etc.). Its purpose is mainly to saturate the bandwidth of the network lead to a computer HP Pavilion DV5 battery failure.
Add two distinct forms of "spyware". The Trojans (Trojan), which is actually a "Trojan horse", ie a malicious program that can each user to accidentally download hacked, usually by clicking on the links of a page (spoofing) or banner to this area and that means a hackers to remotely access your computer HP Pavilion DV3 or is it possible to extract data.
In this category are the famous botnet networks of zombie PCs that are discussed.
Finally, there's Cookie (spyware), a program that applies as citizens and "cookies" that are discussed on the sender information on the environment of your computer or the user profile installed .
The Trojans and Cookies
If the Trojans and cookies (spyware) are not viruses, they produce effects just as disruptive and undesirable for the victim.
Among the cookies include "VirusProtect Pro", a fake anti-spyware is exactly what is installed with the Trojans' Zlob.Trojan "and its variants. Do not rely on the site (which I do not tell you the URL ) without having first installed an anti-spyware or anti-virus on your PC HP Mini 1000 battery when the contamination is guaranteed!
however, remove Viruprotectpro for more details on this trojan and how to eliminate them. Most anti-spyware or anti-virus comes to an end.
This spyware usually install if you have a space problem (pornography, peer-to-peer, etc.), what to install an audio / video codec to watch the video providing access. In fact, if you agree, it will use previously downloaded a Trojan on your computer or install a dozen of your hard drive.
To avoid this mishap, always think carefully before, * click * on a link, you do not know.
Never the request for access if you are on the one hand the ability to play media files on your PC HP 434674-001 battery and if the request comes from an unknown location. If in doubt, open another session and the Internet spend a few minutes to ask questions about this site with key words such as "spyware" and "Virus". If she responds positively, be careful!
If you agree to download the application, the cookie will install a shield icon in the Windows Security Center in the taskbar. Then, the following warning message will appear regularly at the bottom of the screen "The system has a number of active spyware that can affect the performance of your computer SONY VGP-BPS9A/B battery can be detected. Click the icon to get rid of unwanted spyware by downloading an update in anti-spyware solution. "It seems to help, but he lies to you because he is the spy!
Meanwhile, he took the trouble to change the start page of Internet Explorer and edit dozens of entries in the registry. It will be impossible for these Trojans and other cookies that without the intervention of a good anti-spyware or anti-virus.On will return to remove are installed.
Botnet networks: the zombies
Networks, the most vicious "botnets" are. A virus can hide another, download a different virus. Work, and some variants of the worm "Mydoom" e-mail. It welcomes you with an example of "Hello", "Remember me?" or send photos so called, but actually tried the Trojan Backdoor Surila in Visual C + +. Download
Its "payload", his office or function is to create a proxy server on your PC Toshiba Satellite 1800 battery, making it available to spammers through a secure channel protocol in IRC (Internet Relay Chat).
Installed on a network, the virus behaves like a program (a script automatically) and appears to system administrators and ordinary users. Of course, installed on a PC isolated processes displayed in clear text and can be identified.
Within days, an attacker can quietly take control of thousands of "zombie" computers in the world are distributed, forming a so-called "bottom-network" or "botnet".
Cybercrime experts from IBM Internet Security Systems (see blog Intelligence X-Force) discovered that it was possible to rent a botnet consisting of 150 000?PC ?Dell Laptop Battery for the modest sum of $ 350 per week! These are PC to relay spam. And for botnet cyber criminals with impunity and lead a campaign of spam (flood), without the knowledge of all rent. Your goal is to "launch" of the mail servers of large companies in the amount of traffic.
Symantec counted 6 million zombie computers SONY VAIO VGN-FW139E/H battery worldwide during the second half of 2006 increased 29% over the previous six months. However, the number of servers used to relay commands to the fall of zombies (the "bots") to 25%, indicating that the botnet owners have their networks and increase the size of existing networks.
As this article from Panda Software, said the Apple iPhone was only sold (July 2007), it was already the subject of an attack by one of 7,500 zombie computers in the botnet Trojan "Aifone. was "aimed at phishing (spoofing a) page of the iPhone. com. You can find more details in the article on the iPhone.