skip to main |
skip to sidebar
Recently my computer was attacked by some lovely person in China. (No, really, my son traced the intrusion back to its source!) Their virus gobbled up my extensive address book and started spamming everyone in it with ungrammatical come-ons to visit a site. I guess it could have been worse. I just sent emails to my contacts telling them to block my emails from that address. By the mailer daemon messages concerning undeliverable mail...some of them already had.
It is the humiliation of having to confess that, um, my computer got this, er, communicable disease! It is like the virtual version of STDs. No one is comfortable making that kind of announcement!
McAffee has a site that lists the most recent PUP (potentially unwanted program) with descriptions of its type and threat level. Not every PUP is a virus. A quick overview of viruses, worms and Trojans can help to understand the nature of the beast.
A virus attaches itself to a program or file. This allows it to spread from one computer to another. The thing about a virus is that it is dependent on a human to use that program or file. This is what separates a virus from a worm (a subset of a virus) which has gotten around the need for human interaction to cause havoc. A Trojan Horse is malware that appears to be something it is not...a useful program. It fools the user into activating it. Like other malware, Trojans can vary in severity, anything from mildly irritating practical jokes to dangerous intrusions into your private accounts.
There is a joke program that began circulating this year, Generic Joke!dd091a1c
The Joke Program makes the pointer move in random directions without the user's input. This application does not create any files or registry entries for loading at startup and this program can be terminated through the option in Task Manager to end the process, or by rebooting.
There are, however, less benign programs. The ones that insinuate themselves into your system and registry, and make sure that they are rebooted at each startup. A new program called "Dead Eye" tricks users into downloading their code by promising to speed up their computer's processing. It drops files into the registry and creates a shared folder and sets attributes which allows remote users to access the system. Some of its symptoms:
- It disables firewall notifications
- It changes ICMP settings.
- This malware kills all McAfee running processes in the system
- It connects to the following site: ftp.[Removed]domain.com
- Presence of above mentioned registry and file entries
Malware can range from practical jokes which probably only the hacker considers amusing, to real critical attacks on your programs and even your identity and bank account. Make sure you have the best defenses possible. Firewalls are a no brainer. In addition, make sure that you have top grade anti-virus software on patrol. Lastly, don't let down your guard. Most software manufacturers regularly send updates to address current security threats. Make sure you update as soon as they are available. They cannot protect your system unless you install them.
Tuesday, August 31, 2010
Viruses, Pups, and the Blue Screen of Death
Recently my computer was attacked by some lovely person in China. (No, really, my son traced the intrusion back to its source!) Their virus gobbled up my extensive address book and started spamming everyone in it with ungrammatical come-ons to visit a site. I guess it could have been worse. I just sent emails to my contacts telling them to block my emails from that address. By the mailer daemon messages concerning undeliverable mail...some of them already had.
It is the humiliation of having to confess that, um, my computer got this, er, communicable disease! It is like the virtual version of STDs. No one is comfortable making that kind of announcement!
McAffee has a site that lists the most recent PUP (potentially unwanted program) with descriptions of its type and threat level. Not every PUP is a virus. A quick overview of viruses, worms and Trojans can help to understand the nature of the beast.
A virus attaches itself to a program or file. This allows it to spread from one computer to another. The thing about a virus is that it is dependent on a human to use that program or file. This is what separates a virus from a worm (a subset of a virus) which has gotten around the need for human interaction to cause havoc. A Trojan Horse is malware that appears to be something it is not...a useful program. It fools the user into activating it. Like other malware, Trojans can vary in severity, anything from mildly irritating practical jokes to dangerous intrusions into your private accounts.
There is a joke program that began circulating this year, Generic Joke!dd091a1c
The Joke Program makes the pointer move in random directions without the user's input. This application does not create any files or registry entries for loading at startup and this program can be terminated through the option in Task Manager to end the process, or by rebooting.
There are, however, less benign programs. The ones that insinuate themselves into your system and registry, and make sure that they are rebooted at each startup. A new program called "Dead Eye" tricks users into downloading their code by promising to speed up their computer's processing. It drops files into the registry and creates a shared folder and sets attributes which allows remote users to access the system. Some of its symptoms:
- It disables firewall notifications
- It changes ICMP settings.
- This malware kills all McAfee running processes in the system
- It connects to the following site: ftp.[Removed]domain.com
- Presence of above mentioned registry and file entries
Malware can range from practical jokes which probably only the hacker considers amusing, to real critical attacks on your programs and even your identity and bank account. Make sure you have the best defenses possible. Firewalls are a no brainer. In addition, make sure that you have top grade anti-virus software on patrol. Lastly, don't let down your guard. Most software manufacturers regularly send updates to address current security threats. Make sure you update as soon as they are available. They cannot protect your system unless you install them.
Popular Posts
-
Gift 20 personal Picture Collage Maker Pro license code on this blog contest has ended and I have selected the winners by randowm.org. Cong...
-
Are you one of those tech enthusiasts who have always the coolest PDA or Pocket PC phone? Acquisition of wholesale mobile phones can be a ch...
-
Normally If you want to have professional designers custom build your site, must be prepared to dish out at least several hundred dollars. A...
-
A few days ago published about promo key license of Kaspersky internet security 2011 . But this promo Kaspersky for the Chinese version only...
-
NET books have always been the enviable gadgets, which gives us the possibility of stay connected while on the move. They are very attractiv...
-
Nokia Video Converter Factory Pro has been updated to version 3 and WonderFox Soft, Inc. give software with free license key until 21 Decemb...
-
iPhone is the latest invention of the market and people are willing to buy this new technology. Millions of people are now using this amazin...
0 comments:
Post a Comment