PC and Internet Security Wold Largest  

Posted by Meliton Capricho Villador

PC and Internet Security powered by the World's largest real time threat database...

 

Malware Center  

Posted by Meliton Capricho Villador

CLICK THIS    Malware Center


Kaspersky New Virus Update , and Virus Removal  

Posted by Meliton Capricho Villador

 Virus Removal Tools 

Kaspersky Virus Removal Tool 2010

DETECT AND DELETE YOUR MALICIOUS PROGRAMS

Click and INSTALL  

Virus Removal Tools 

and

Kaspersky Virus Removal Tool 2010

 New Virus Names

Name of malicious program↑ Detection timeUpdate released
11 December 2010
Trojan.Win32.StartPage.ahxp 00:40  
Trojan.Win32.Buzus.gleu 00:40  
Trojan.Win32.Sadenav.bpc 00:40  
Trojan.Win32.StartPage.ahxm 00:40  
Trojan-Downloader.Win32.VB.acus 00:40  
Trojan-Banker.Win32.Banker2.aqo 00:40  
Email-Worm.Win32.Wangy.qy 00:40  
Trojan.Win32.Sadenav.bpb 00:40  
Trojan.Win32.StartPage.ahxo 00:40  
Trojan-Downloader.Win32.Small.bgov 00:40  
Trojan-Clicker.Win32.Delf.eua 00:40  
Trojan-Dropper.Win32.VB.asem 00:40  
Trojan-Dropper.Win32.FrauDrop.buq 00:40  
Trojan.Win32.StartPage.ahxl 00:40  
Backdoor.Win32.Hupigon.mych 00:40  
Trojan-Dropper.Win32.TDSS.uff 00:40  
Trojan.Win32.StartPage.ahxq 00:40  
Trojan-Downloader.Win32.Small.bgou 00:40  
Trojan.Win32.VBKrypt.aduf 00:40  
Trojan.Win32.StartPage.ahxn 00:40  
Trojan-Spy.Win32.Dibik.frw 00:26  
Backdoor.Win32.Yobdam.fye 00:26  
Trojan-PSW.Win32.Bjlog.rrz 00:26  
Backdoor.Win32.BlackHole.yoj 00:26  
Trojan-Downloader.Win32.Small.bgor 00:26  
Trojan-Downloader.Win32.Small.bgot 00:26  
Trojan.Win32.Genome.mjya 00:26  
Trojan-Downloader.Win32.Small.bgoq 00:26  
Trojan.Win32.Genome.mjxz 00:26  
Trojan.Win32.Delf.aktv 00:26  
1  |  2  |  3  |  4  |  5  |  Next Page >>  |  Last Page


 

Computer Security FAQ

In the past, PCs were mainly under threat from viruses and worms. The main purpose of these programs was to spread; however, some programs were also designed to cause damage to files and PCs. Such malicious software, or “malware”, could be described as ‘cyber vandalism’.

A virus is a program that replicates, i.e. it spreads from file to file on your system and from PC to PC. In addition, it may be programmed to erase or damage data.
Worms are generally considered to be a subset of viruses, but with certain key differences. A worm is a computer program that replicates, but does not infect other files. Instead, it installs itself once on a computer and then looks for a way to spread to other computers.
In the case of a virus, the longer it goes undetected, the more infected files there will be on the computer. Worms, however, create a single instance of their code. Moreover, unlike a virus, a worm code is stand-alone. In other words, a worm is a separate file while a virus is a set of code which adds itself to existing files.

A Denial-of-Service (DoS) attack is designed to hinder or stop the normal functioning of a web site, server or other network resource. There are various ways for hackers to achieve this. One common method is to flood a server by sending it more requests than it is able to handle. This will make the server run slower than usual (and web pages will take much longer to open), and may crash the server completely (causing all websites on the server to go down).
A distributed-Denial-of-Service (DDoS) attack differs only in the fact that the attack is conducted using multiple machines. The hacker typically uses one compromised machine as the ‘master’ and co-ordinates the attack across other, so-called ‘zombie’, machines. Both master and zombie machines are typically compromised by exploiting a vulnerability in an application on the computer, to install a Trojan or other piece of malicious code.

Phishing is a very specific type of cybercrime designed to trick you into disclosing personal financial details. Cybercriminals create a fake website that looks just like a bank’s website (or any other web site where online financial transactions are conducted e.g. eBay). They then try to trick you into visiting this site and typing in your confidential data, such as your login, password or PIN. Typically, cybercriminals send out a large numbers of e-mails containing a hyperlink to the fake site.

This term describes a collection of programs used by a hacker to evade detection while trying to gain unauthorized access to a computer. The term originated in the Unix world, although it has since been applied to the techniques used by authors of Trojans that run under Microsoft® Windows® to conceal their actions. Rootkits have been used increasingly as a form of stealth to hide Trojan activity. When installed on the system, rootkits are not only invisible to users, but they are designed to escape detection of security software as well. The fact that many people log into their computers with administrator rights, rather than creating a separate account with restricted access, makes it easier for cybercriminals to install a rootkit.

Malware - short for malicious software - is an umbrella term that refers to any software program deliberately created to perform an unauthorized and often harmful action. Viruses, backdoors, keyloggers, password stealers and other Trojan horse programs, Word and Excel macro viruses, boot sector viruses, script viruses (batch, windows shell, java, etc.) and Trojans, crimeware, spyware and adware are but a few examples of what is considered malware.
It was once sufficient to call something a 'virus' or 'Trojan horse', but infection methods and vectors evolved and the terms virus and Trojan no longer provided a satisfactory definition for all the types of rogue programs that exist.
The term Trojan refers to the wooden horse used by the Greeks to sneak inside the city of Troy and capture it. The classic definition of a Trojan is a program that poses as legitimate software but when launched will do something harmful. Trojans can't spread by themselves, which is what distinguishes them from viruses and worms.
Today, Trojans are typically installed secretly and deliver their malicious payload without your knowledge. Much of today’s crimeware is comprised of different types of Trojans, all of which are purpose-built to carry out a specific malicious function. The most common are Backdoor Trojans (often they include a keylogger), Trojan Spies, password stealing Trojans and Trojan Proxies that convert your computer into a spam distribution machine.

In a drive-by download, your computer becomes infected just by visiting a website which contains malicious code. Cybercriminals search the Internet looking for vulnerable web servers that can be hacked. On such servers, cybercriminals can inject their malicious code (often in the form of malicious script) onto the web pages. If your operating system or one of your applications is un-patched, a malicious program is downloaded to your computer automatically when you access the infected web page.

These are programs which record key presses (i.e. what a user types on the keyboard) and can be used by a hacker to obtain confidential data (login details, passwords, credit card numbers, PINs, etc.). Backdoor Trojans typically come with an integrated keylogger.

Adware is the general term applied to programs that either launch advertisements (often pop-up banners) or re-direct search results to promotional web sites. Adware is often built into freeware or shareware programs: if you download a freeware program, the adware is installed on your system without your knowledge or consent. Sometimes a Trojan will secretly download an adware program from a web site and install it on your computer.
Web browsers that aren’t up-to-date often contain vulnerabilities. Such browsers are vulnerable to hackers tools (often referred to as Browser Hijackers) that can download adware to your computer. Browser Hijackers may change browser settings, redirect incorrectly typed or incomplete URLs to a specific site, or change the default homepage. They may also redirect searches to pay-to-view (often pornographic) web sites.
Typically, adware programs do not show themselves in the system in any way: there will be no listing under Start | Programs, no icons in the system tray and nothing in the task list. They seldom come with a de-installation procedure and attempts to remove them manually may cause the original carrier program to malfunction.

The term used for a network of computers controlled by cybercriminals using a Trojan or other malicious program.

As the name suggests, this is software that is designed to harvest your data and forward it to a third party without your consent or knowledge. Such programs may monitor key presses ('keyloggers'), collect confidential information (passwords, credit card numbers, PIN numbers, etc.), harvest e-mail addresses or track browsing habits. In addition to all of this, spyware inevitably affects your computer’s performance.

 


 


 

Identifying Malware: Virus, Worms, Trojans and Spyware Author  

Posted by Meliton Capricho Villador

 This tip is intended to help you identify, classify malware and eliminate them from your computer. To make it more convenient I have divided the tip into two parts. This is the first part which discusses different types of malware, the next part will explain how to identify and eliminate malware.
The more we take to computers for day to day activities, the greater is the threat perception poised by malware. At this point in time the cyber threat we face has multiple forms like virus, worms,trojans, spyware etc. However, all malware do not affect equally, knowing the differences between them can help you avoid excess strain and tackle them more effectively. In this post, we will attempt to define, differentiate and eliminate these malware if possible through conventional means.
Virus - A computer virus is a self-replicating program that is intended to harm your computer through many ways. Depending on the type of the virus, damage done could vary from slight annoyance to a complete system disruption (I had a real bad experience with Chernobyl virus which corrupted BIOS ). Virus travel, mostly by attaching themselves to executable files, which are then sent to other computers by the unaware user. It propagates to other computers quickly but it cannot travel by itself and requires some user action.
Worms –    A worm can be categorized as a sub-class of virus that can propagate itself without the user's active participation or host file.   Worms are especially dangerous in networked computers since it begins spread to other computers in the network and in the process congests network as well as consume all memory of the system. Lately worms are becoming a major threat because of their ability to take the network down.
Trojans – As the name implies Trojan Horse programs are programs that pretend to being utilities, games etc but when installed they compromise the security of the system. Trojans can neither replicate nor can they transfer, the only way to infect the system would be to actually run it on the target computer (or trick the victim into running it!). Popular Trojans when installed allow the remote attacker to take control of the victim's computer completely. Some popular Trojans are also marketed as Remote Administration Kits, e.g. Netbus, Back Orifice etc.
Spyware-   Applications that gather information about the user without her/his knowledge which is then transmitted to someone else for the purpose of targeting the user with customized advertisement. Apart from invading privacy these programs also consume the user's system resources as well as bandwidth, adversely affecting performance which at  times may be comparable to attack by computer virus.
Each of this program is difficult to detect or remove, which is why all of us depend on various anti-virus software and firewalls to protect us. While most of these anti-viruses are affective there are times when they become ineffective, especially when new malware arrive on the scene. Typically, anti-virus programs detect malware by matching the files with the signatures or definitions of known-viruses, present in their database. This is why it is important to update definitions from Web on a regular basis. Some anti-viruses also use heuristic methods, detecting suspicious activity and alerting the user but these alerts are more often raised for legitimate programs as opposed to malware.
The bottom line is that anti-virus applications do fail and fail pretty frequently too, depending upon the frequency of new virus strains being written and released. Being aware of the risk that malware pose can help you avoid getting your computer infected. 


New Virus UPdate F-Secure  

Posted by Meliton Capricho Villador


What is "WebFldrs XP"  

Posted by Meliton Capricho Villador

I read many article and forum about webfldrs in Xp.some say "a virus, trojans, malware,spyware.etc..
If you're set on removing it, you can set a restore point, remove it, and see how things work out.
Don't Panic guys.
Microsoft WebFolders is a tool which is incorporated into the WindowsXP operating system. It allow the seamless use of FTP from your desktop without the need to install a third party application. Using Microsoft WebFolders you can create a connection with an FTP Server which will simply appear on your desktop as directory that you can copy to or from as you would any other hard drive in your computer.
I try to use it . for diagnostic.
if you have some problem.. Read this Link:

Windows Hide Drive  

Posted by Meliton Capricho Villador

Run-
CMD - type "DISKPART" and Enter  without quote
type "volume list"
select volume to hide
sample volume 0--- "select volume 0"
sample volume 0 is drive D: -- type " remove letter D"

TO UNHIDDEN
type"assign letter D"

refresh your computer

Contributors

My photo
-XPAC RPO, PC FOR THE MANAGER cert.555981 -TESDA Hardware Servicing Exam(NCII) -CCNA bootcamp -Certified Network Professional Program 566165 Jan 26, 2008

Popular Posts