CounterMeasures for Virus and Worms attack

Tuesday, 7 June 2011


VIRUS :: Computer virus are perceived as a threat to both business and personnel
                            Virus is a self replicating program that produces its own code by attaching copies itself into other executable codes

SOME VIRUS NAMES ARE ::
                                                               Melissa Brew & Back orifice
                                                               Melissa, Corner, Tristate
                                                               Slammer, Sobig
                                                               Email-Worm, win32, I love you virus

WHY VIRUS ARE CREATED ::
  • Research projects 
  •  Pranks 
  •  Vandalism 
  •  To attack the product of specifies companied 
  •  To distribute the political messages 
  •  Financial gain 
  •  Identity theft 
  •  Spyware

WORMS :: Worms are distinguished from virus by the fact that a virus requires some from of the human intervention to infect a computer whereas a worm does not
                                     A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs

INDICATIONS OF VIRUS ATTACK ::
  • Programs take longer to load than normal 
  • Computer's hard drive constantly runs out of free space 
  • Files have strange names which are not recognizable 
  • Resources are used up easily

HARDWARE ATTACKS ::
                     Power Faults    :: Sudden power failure, voltage spikes & cause damage to system
                     System Life     :: System gets worn-out over period of time
                     Typos                      :: Data gets deleted or corrupted or replacement of wrong files

SOFTWARE ATTACKS ::
                                                                                         Intentionally launched malicious programs enable the attacker to use the computer in an unauthorized manner
                     General Categories  :: Virus and Worms
                                                                  Logic bombs
                                                                  Trojans

VRIUS DETECTION METHODS ::
                            Scanning   :: Once a virus has been detected, it is possible to write scanning programs that look for signature string characteristics of the virus
                            Integrity Checking :: Integrity checking products work by reading your entire disk and recording integrity data that acts as a signature for the files and system sectors
                            Interception :: The interception monitors operating system requests that write to disk

ANTI TOOLS - ANTI - VIRUS SOFTWARES ::
Use the following anti virus to be saved from virus and worms
  
   AVG Antivirus :: Download => AVG antivirus crack + serial key
   Norton Antivirus :: Download => Norton antivirus crack + serial key
   Avast Antivirus :: Download => Avast antivirus crack + serial key
   AntiVir Personal Edition :: Download => Anti Vir Personal Edition crack + serial key
   Kaspersky internet security :: Download => Kaspersky internet secruity crack + serial key
                   
NOTE ::  Scan your computer every after 15 day of the month

0 comments: