Every day-virus computer virus to disrupt the newly created and make
damage of the computer system with us. The following ten
virus-the virus that is common and potentially cause damage. Virus-virus
created new every day. This means that many viruses that are not included in the
this list. The best things we can do are always vigilant, always
to update anti-virus, and always note whether the computer you are currently
exposed to the virus or not.
Virus: Trojan.Lodear
Trojan Horse attack when we download the data from the internet. Virus
will inject a. dll to internetexplorer. exe that caused
system instability.
Virus: [EMAIL Protected]
Is a virus that send bulk email to the site that have
low level of security. This virus can delete registry keys and
part-part and may block access to the network security website.
Virus: Backdoor.Zagaban
Virus trojan inject this one particular computer to be used
as shelter for the damage to the network or network related.
Virus: W32/Netsky-P
This virus is able to transmit bulk email itself to email addresses
produced by a file on the PC / local drive.
Virus: W32/Mytob-GH
Virus email bulk carrier and is a Trojan on the computer to the IRC
Windows based. Messages sent by this virus with the title
selected randomly from the list that already exist such as: warning restrictions
an account, Suspensi email account, the size of the security, support member, a warning
important.
Virus: W32/Mytob-EX
The virus is spread, mass email and IRC Trojan with a similar
W32-mytob-gh. W32/mytob-ex continuously behind the scenes, providing the door
back to the server to reach another computer via IRC channels. Virus
is spread by itself, especially attachments to email address.
Free antivirus software and shareware can be fully downloaded
here
Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER
This virus family have karasteristik the same of what they
do. They spread the bulk email that can be controlled through
Internet Relay Chat (IRC) network. In addition, they can spread
email through a variety of computer operating systems such as the weak LSASS
(MS04-011).
Virus: Zafi-D
Is virus bulk email sender and peer-to-peer makes a copy
itself to the Windows system folder with the file name nortonupdate. exe. Virus
This can create a number of files in windows system folder with the file name
consisting of 8 random characters and the extension DLL. w32/zafi-d copy
itself to folders with names containing share, upload, or music as
ICQ 2005anew! . exe or winamp 5.7 new! . exe. W32/zafi-d will also be
pemberitahu box displays the error that trick with the title "CRC: 04f6Bh" and
the text "Error in packed file!".
Virus: W32/Netsky-D
This virus also send attacks through IRC backdoor function that also
infects a weak computer.
Virus: W32/Zafi-B
This virus attacks the peer-to-peer (P2P) and email viruses will be copied with
itself in the windows system folder that are named in otomastis
random.
Free antivirus software and shareware can be fully downloaded
here
Senin, 16 Maret 2009
Definition of The Worm Variant Virus, Trojan and Spyware
a. Worm
Worm is a security hole or slit our weaknesses on the computer that allows our computer infected with the virus without having to execute a file that usually occur on the network.
b. Trojan
Trojan is a program that allows our computer controlled the other through the network or the Internet.
c. Spyware
Spyware is an application that let the data or information practices of users in using the computer to outside parties without us realize. Usually used by the advertisers.
If we see the gaffe on storage media such as a file called strange that we never created the file or not the type of application / application as a claim to the application but then we do not click, we are open, or we run the computer so that the virus is not transmitted to the computer that we use.
Here are symptoms of Computers / Computer Virus infection:
- Computer running slow from normal
- Frequently eror message out or exotic
- Changes the appearance of the computer
- Storage media such as floppy disks, flash, and so copying the file directly without our coffee strange when we connect to the computer.
- Computers like restart or crash when running.
- Like any posts or messages appear strange
- Computer stops responding, or hang us.
- Harddisk can not be accessed
- Printer and other devices can not be used even though there is no hardware problems and software drivers.
- Often there is the menu or dialog box that error or damage.
- The loss of a few basic computer functions.
- Computers trying connect themselves with the Internet or a network without our order.
- Files that we store on computers or storage media that are lost or hidden viruses. and others ...
Examples of media distribution of computer viruses from one computer to another computer:
- Storage Media (diskettes, flash, external hard drive, zipdisk, cd, dvd, bluray disc, cartridge, and so forth)
- Network lan, wan, man, and so forth.
- File attachment or a file attachment in email or other electronic messages.
- File software (software) that ditunggangi computer virus.
The most powerful way that we are not exposed to computer viruses is to know how to install the original computer program is not pirated or original ditunggangi virus that does not and his friends, does not connect with the computer network or the internet, and never to open or execute files from the originating computer other.
But I like it too extreme and less gaul in the use of the computer everyday because we usually do the exchange of data or files with other computers such as work files, image files, file attachments, music files, video files, and so forth.
So we are to avoid computer viruses infect our computer and then we must be cautious in interacting with the file from another computer, the files from the storage media of another person, an email attachment, file exchange network, computer security holes we, and others. Install a good antivirus is updated regularly and a firewall program to network and anti-spyware and adware to address other types of interference.
Worm is a security hole or slit our weaknesses on the computer that allows our computer infected with the virus without having to execute a file that usually occur on the network.
b. Trojan
Trojan is a program that allows our computer controlled the other through the network or the Internet.
c. Spyware
Spyware is an application that let the data or information practices of users in using the computer to outside parties without us realize. Usually used by the advertisers.
If we see the gaffe on storage media such as a file called strange that we never created the file or not the type of application / application as a claim to the application but then we do not click, we are open, or we run the computer so that the virus is not transmitted to the computer that we use.
Here are symptoms of Computers / Computer Virus infection:
- Computer running slow from normal
- Frequently eror message out or exotic
- Changes the appearance of the computer
- Storage media such as floppy disks, flash, and so copying the file directly without our coffee strange when we connect to the computer.
- Computers like restart or crash when running.
- Like any posts or messages appear strange
- Computer stops responding, or hang us.
- Harddisk can not be accessed
- Printer and other devices can not be used even though there is no hardware problems and software drivers.
- Often there is the menu or dialog box that error or damage.
- The loss of a few basic computer functions.
- Computers trying connect themselves with the Internet or a network without our order.
- Files that we store on computers or storage media that are lost or hidden viruses. and others ...
Examples of media distribution of computer viruses from one computer to another computer:
- Storage Media (diskettes, flash, external hard drive, zipdisk, cd, dvd, bluray disc, cartridge, and so forth)
- Network lan, wan, man, and so forth.
- File attachment or a file attachment in email or other electronic messages.
- File software (software) that ditunggangi computer virus.
The most powerful way that we are not exposed to computer viruses is to know how to install the original computer program is not pirated or original ditunggangi virus that does not and his friends, does not connect with the computer network or the internet, and never to open or execute files from the originating computer other.
But I like it too extreme and less gaul in the use of the computer everyday because we usually do the exchange of data or files with other computers such as work files, image files, file attachments, music files, video files, and so forth.
So we are to avoid computer viruses infect our computer and then we must be cautious in interacting with the file from another computer, the files from the storage media of another person, an email attachment, file exchange network, computer security holes we, and others. Install a good antivirus is updated regularly and a firewall program to network and anti-spyware and adware to address other types of interference.
What is Antivirus?
Antivirus is a type of software that is used to detect and remove computer viruses from computer systems. Also called the Virus Protection Software. This application can determine whether a computer system has been infected with a virus or not. Generally, the software running in the background (background) and scanning of all files that are accessed (opened, modified, or when saved). Most of the antivirus to work with several methods such as below:
* The detection using the database of virus signatures (virus signature database): How this antiviral approach that is widely used by traditional anti-virus, the search for signs of the presence of the virus by using a small portion of virus code that has been analyzed by antivirus vendor, and has been categorized according to the type, size, power and smash a few other categories. This can be calculated fast and reliable to detect the virus-the virus that has been analyzed by antivirus vendor, but can not detect the new virus until the virus signature database is installed in the new system. Virus signature database can be obtained from the antivirus vendor, and generally can be obtained for free via download or via subscription (subscription).
* The detection to see how the virus works: How it works is like this antiviral approach borrowed from the new technology that is applied in the Intrusion Detection System (IDS). This is often referred to as Behavior-blocking detection. This is the policy (policies) that should be applied to detect the presence of a virus. If there is software that behavior "not reasonable" according to the policy that is applied, as well as the software tries to access the address book to send e-mail in bulk to the list of e-mail that is in the address book is (it is often used by virus to transmit the virus through e-mail), then the antivirus will stop the process undertaken by the software. Antivirus can also isolate codes suspected virus as administrator to determine what to do next. The advantage of this is the antivirus can detect the new virus-the virus that has not been recognized by the virus signature database.The weakness, clearing way to monitor the antivirus software business as a whole (not the monitor), it often makes anti-virus false alarm or "False Alarm" (if the antivirus configuration too "loud"), or even allow the virus to multifly in the system (if antivirus configuration is too "soft"), false positive occurred. Some manufacturers call this technique as a heuristic scanning.
Antivirus which uses behavior-blocking detection is still a little amount, but in the future, most likely all will use antivirus this way. Some antivirus also use two methods on the same time
* The detection using the database of virus signatures (virus signature database): How this antiviral approach that is widely used by traditional anti-virus, the search for signs of the presence of the virus by using a small portion of virus code that has been analyzed by antivirus vendor, and has been categorized according to the type, size, power and smash a few other categories. This can be calculated fast and reliable to detect the virus-the virus that has been analyzed by antivirus vendor, but can not detect the new virus until the virus signature database is installed in the new system. Virus signature database can be obtained from the antivirus vendor, and generally can be obtained for free via download or via subscription (subscription).
* The detection to see how the virus works: How it works is like this antiviral approach borrowed from the new technology that is applied in the Intrusion Detection System (IDS). This is often referred to as Behavior-blocking detection. This is the policy (policies) that should be applied to detect the presence of a virus. If there is software that behavior "not reasonable" according to the policy that is applied, as well as the software tries to access the address book to send e-mail in bulk to the list of e-mail that is in the address book is (it is often used by virus to transmit the virus through e-mail), then the antivirus will stop the process undertaken by the software. Antivirus can also isolate codes suspected virus as administrator to determine what to do next. The advantage of this is the antivirus can detect the new virus-the virus that has not been recognized by the virus signature database.The weakness, clearing way to monitor the antivirus software business as a whole (not the monitor), it often makes anti-virus false alarm or "False Alarm" (if the antivirus configuration too "loud"), or even allow the virus to multifly in the system (if antivirus configuration is too "soft"), false positive occurred. Some manufacturers call this technique as a heuristic scanning.
Antivirus which uses behavior-blocking detection is still a little amount, but in the future, most likely all will use antivirus this way. Some antivirus also use two methods on the same time
Langganan:
Komentar (Atom)
