tag:blogger.com,1999:blog-73504390757533741092024-03-13T15:04:41.068-07:00Antivirus 4 UGet All info About Antivirus,Spywares,FirewallNagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.comBlogger22125tag:blogger.com,1999:blog-7350439075753374109.post-46091707824677603722008-09-07T23:53:00.000-07:002010-08-02T14:34:43.226-07:00viruses on the international space stationthis past week there was a lot of buzz surrounding the news that an autorun worm had infected 2 laptops aboard the international <a href="http://spaceflight.nasa.gov/station/">space station</a>... i wasn't sure i was going to bother saying anything about it at first but then i decided it might serve as an interesting object lesson so let's look at what we can learn from this event and what could have been done differently....<br /><br />my first reaction when reading of the event was that this just goes to show how pernicious and autonomous self-replicating malware truly is... that notion (that viruses/worms are somehow worse or more autonomous than other forms of malware) has been scoffed at in the past but viruses in space stand as a testament to their ability to get into places no one intended or would have imagined... no other form of malware besides self-replicators would have been able to find new victims in that sort of environment...<br />source- anti-virus-rants.blogspot.com<br /><br />another thing we can learn from this is to stop clinging to the fantasy that the only kind of malware we need to worry about anymore is the new stuff, that old-style viruses and worms aren't worth worrying about anymore... this wasn't brand new malware, it wasn't state of the art, and it wasn't something researchers on the bleeding edge would have taken notice of even when it was new... the malware threat landscape isn't composed exclusively of novelties, there's a heck of a lot of banality out there as well...<br /><br />yet another lesson is that can be learned is that for all the whining about how AV is failing, at least some of the evidence used to support that argument (in other words, some of the failures) is actually a result of not using AV in the first place, not keeping it up to date, or not following the various other best practices for AV...<br /><br />actually using an AV program is the first thing the astronauts and/or NASA could have done differently... while i'm sure there are plenty of arguments for why one might not want an anti-virus program on them, such as highly critical real-time processing of experimental data, these were laptops running windows and so were already unsuitable for real-time processing ('what do you mean the OS must have been busy don't something else during that time period?')... i assume someone up there must have had AV or else we wouldn't have a name for the malware... <br /><br />failing that, they could have used some other sort of anti-malware technology like application whitelisting... in fact, considering the environment that might even be a more appropriate approach since it's unlikely that astronauts need to introduce new software to those machines very often... that is unless part of their job requires them to rewrite or apply patches to software being used in the experiments to collect/analyze data... come to think of it, that might actually be the case - it's not like the folks designing the experimental payloads have a lot of chances to test and debug their software under real-world conditions when the real-world in question is actually out of this world...<br /><br />the astronauts could have operated the machines under non-administrative accounts - actually there isn't really anything to suggest they didn't, nor is there anything specific to an autorun worm's replication technique that should require administrative access... despite a previous post i made highlighting the ways in which least privilege can fail to stop malware, it still is fairly effective against a lot of existing malware...<br /><br />they could have disabled autorun on those machines - in fact, they probably still should disable it... autorun is purely a convenience feature for the technologically inept; hopefully that's not the sort of folks NASA is sending into space (then again, they did get infected by somewhat old malware)...<br /><br />finally, they could have used something other than windows machines... although technically not immune to malware, macs and <a href="http://www.linux.org/">linux</a> machines have a far smaller pool of threat agents to worry about and the lower population density means that they are less connected to other similar endpoints that could pass on something they'd be susceptible to... of course, once again this is likely subject to what the machines are being used for - if they're running or monitoring experiments with them then they may be stuck with whatever the people who designed those experiments wrote their software for (and considering the cost of doing anything in space, cutting corners on the ground and using cheap windows developers is pretty likely)... <br /><br />according to <a href="http://www.nasa.gov/">NASA</a> this is not the first time they've had a virus infection in space... let's hope they also look at these sorts of events as learning experiences and figure out how to do things better in future...<br /><br /><a href="http://www.mochahost.com/2245-0-1-46.html" target="_blank"><img border="0" <br /><br />src="http://www.mochasupport.com/aff/banners/88x31_2009.gif" width="88" height="31"></a>Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-60644639228811978852008-07-28T09:52:00.000-07:002008-07-28T11:04:05.262-07:00Best antivirus Software2007 <strong><a href="http://www.antivirus1234.com/">BEST AntiVirus software</a></strong>:<br /><br />Golden:<a href="www.bitdefender.com/">BitDefender AntiVirus</a><br />Silver:<a href="www.kaspersky.com/ ">Kaspersky</a><br />Copper:Quick Heal antivirus software<br />04:PC-cillin AntiVirus<br />05:ESET Nod32 antivirus software<br />06:McAfee VirusScan<br />07:Norton AntiVirus<br />08:<a href="free.avg.com/">AVG Anti-Virus</a><br />09:eTrust EZ Antivirus<br />10:F-Secure Anti-Virus<br />11:AntiVirusKit<br />12:<a href="www.avast.com/ ">AVAST!</a> AntiVirus<br />13:Panda Titanium<br />14:F-Prot antivirus software<br /><br /><strong>Antivirus software </strong>are computer programs that attempt to identify, neutralize or eliminate malicious software. The term "antivirus" is used because the earliest examples were designed exclusively to combat computer viruses; however most modern antivirus software is now designed to combat a wide range of threats, including worms, phishing attacks, rootkits, trojan horses and other malware. Antivirus software typically uses two different approaches to accomplish this<br />These are the world renowed <a href="http://www.antivirus1234.com/">BEST AntiVirus softwares</a> -Antivirus1234.comNagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-56081015812165131902008-07-28T09:46:00.000-07:002008-07-28T09:52:24.653-07:00Need of anti virus software...By practicing responsible web surfing and <a href="http://en.wikipedia.org/wiki/Email">email</a> handling most Internet users can and do cut their <a href="www.mcafee.com/us/threat_center/default.asp ">virus threats </a>down to one every blue moon, the anti virus program on the other hand is with you every day of your life.<br /><br /><br />So why do many anti virus packages try to attract attention, take up lots of resources and generally just bug the life out of you every day, all this to prevent a relatively rare occurrence.<br /><br /><br /><a href="http://antivirus1234.blogspot.com/">Anti virus software </a>create little popups to inform you of every single program trying to access the Internet, tell you in freaky computerized voices that they have been updated, suck a load of your computers resources, cause your computer to lag on startup as they start their scan services; just to name a few problems.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-16925350595375385792008-07-28T09:35:00.000-07:002008-07-28T09:41:39.947-07:00New VIPRE Antivirus + AntispywareFor the more technically inclined <a href="http://www.vipreantivirus.com/">VIPRE</a> offers several useful bonus tools. If you enable the Secure <a href="http://en.wikipedia.org/wiki/File_system">File</a> Eraser, you get a menu item to the right-click menu for files and folders that lets you permanently erase sensitive data. Specifically, Eraser overwrites the file three times before erasing it. The erases recently used file lists and other traces of computer and browser activity for several dozen popular programs. And the PC Explorer offers a view of many system settings that are relevant to security. <br /><br />Probably the most useful PC Explorer elements are the list of <a href="http://en.wikipedia.org/wiki/Start_menu">startup programs </a>and running processes. For each program it displays the name, publisher, and description along with an icon identifying that program as safe, suspicious, hazardous, or unknown. These are strictly informational—you can't remove a program from the startup list or terminate a process. <br />Source-pcmag.com/article2/0,2817,2326532,00.aspNagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-59006753636167970422008-06-27T21:24:00.000-07:002008-06-27T21:30:57.407-07:00Avast! Antivirus Professional EditionThe professional solution to great protection <a href="http://www.avast.com/eng/avast_4_professional.html">avast! 4 Professional Edition </a>represents the best antivirus protection avast! 4 Professional Edition comes with anti-spyware, <a href="http://www.antirootkit.com">anti-rootkit</a> and strong self-protection built-in. It is designed to protect your valuable data and programs, as well as keep itself up-to-date and has the kind of built-in features that many vendors charge for additionally, or don’t include at all. Simply install and forget. All-inclusive, comprehensive protection avast! 4 Professional Edition includes ANTI-SPYWARE protection, certified by the <a href="http://www.westcoastlabs.org">West Coast Labs</a> <a href="http://www.check-mark.com">Checkmark</a> process, to protect against the latest spyware threats and ANTI-ROOTKIT DETECTION based on the best-in class GMER technology, built in to the scan engine. No additional purchase is required. Simple to use and automated Just install and go. Automatic incremental updates provide<a href="http://en.wikipedia.org/wiki/Real-time_protection"> real-time protection </a>of your system, including web surfing. We’ve made avast! antivirus as simple to use as possible, while allowing full control of your security.- <br />Fast direct download Avast! <a href="http://www.avast.com/eng/download-avast-professional.html"></a>Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-28532633267229663142008-06-27T21:07:00.000-07:002008-06-27T21:15:14.150-07:00Spyware and WinlogonDo you know what is Winlogon?<br /><br /><a href="http://www.neuber.com/taskmanager/process/winlogon.exe.html">Winlogon </a>creates the desktop for the windows environment.<br /><br />The registry key is located at:<br />HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell<br /><br />Just by adding an ADDITIONAL shell (to the default explorer application) a spyware program can get itself loaded on windows startup.<br /><br />"The Shell key value can contain a comma-separated list of programs to be executed. Explorer is the default shell program and will be executed if the Shell key value is null or not present. By default, <a href="http://kb.iu.edu/data/aknw.html">Explorer</a> is listed." <br /><br /><strong>Editing the Windows registry-</strong><br />You can use either regedit.exe or regedt32.exe to modify the <a href="http://en.wikipedia.org/wiki/Windows_Registry">registry</a>. Under Windows XP and Windows Server 2003 there is no difference.<br /><br />However if you are using <a href="http://www.microsoft.com/WINDOWS/">Windows NT </a>4 or Windows 2000 then regedit.exe would have a few restrictions and is recommended only to search the registry (to view the restrictions, please refer to the references below)Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-69168269145416470582008-06-24T04:39:00.000-07:002008-06-24T04:41:52.927-07:00Hacker Pleads Guilty to Attacking Anti-phishing GroupA California hacker has pleaded guilty to launching a Valentine's Day 2007 computer attack that nearly knocked an anti-phishing Web site offline.<br /> <br /> 21 year old Gregory King pleaded guilty Tuesday in federal court to two counts of "transmitting code to cause damage to a protected computer," for launching distributed denial of service (DDOS) attacks against the Castlecops anti-phishing Web site and Killanet, an online forum for gamers and graphic designers.<a href="http://news.yahoo.com/s/pcworld/20080610/tc_pcworld/146953">Read more..</a>Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-57814523870384365142008-06-24T03:54:00.000-07:002008-06-24T03:57:15.469-07:00Configuring Norton 360 for firefoxThe <strong>Norton 360 software </strong>package for Windows includes a firewall component, which controls the programs that can connect to the outside world and the types of connections that they can make. It also includes an "Eavesdropping Protection" feature, which can mis-identify Firefox and prevent it from working properly. Norton 360 can also erase Firefox's browsing history. <br /><br />This article describes how to configure Norton 360 to allow Firefox to work normally. Link:-<a href="http://support.mozilla.com/en-US/kb/Configuring+Norton+360">Configuring Norton 360 antivirus</a>Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-39097945075890370352008-06-02T12:02:00.000-07:002008-06-02T12:20:21.050-07:00Does using internet service affect my privacy?Well yes it does affect the privacy but sometimes you can keep it safe by using these method<br /><br />1. Don't register in unknown websites.<br />2. Don't register in websites which you don't visit often or don't know what they are offering.<br />3. Make sure you don't sign up for free newsletters<br />4. Don't provide your mail id publicly.<br />5. Also See to it that you always use an different identity [ you can even use a different photo of yours,if required.]<br /><br />This way your <a href="http://w2.eff.org/Privacy/">privacy </a>will not be ruined.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-67117522049850680592008-05-30T07:20:00.000-07:002008-06-02T12:25:10.913-07:00Computer Security-Free Virus Removal ToolsGetting a virus on your system is frustrating to say the least, and can be hazardous to the health of your computer. Indeed, today's malicious software can even steal your identity and wreck your hard-earned credit rating. To help fight back, here's a list of free tools, tips, and tricks to get rid of viruses and keep them from getting back on your system.<br />Free Virus Removal Tools<br />Sure the antivirus vendors want to make money, but if you ever get the chance to meet one of their virus researchers, you'll find their real motivation is to protect users. As corny as that may sound, it's true. That's why when stubborn or fast-spreading infectors are discovered, antivirus vendors release special tools to remove the malware - and give the tools away free. It's no substitute for installed antivirus software, but if you're already infected and in a pinch, it's the next best thing to, well, installed antivirus software.<br />* Create a Free F-Prot Rescue CD - FRISK Software - one of the oldest and most respected antivirus companies (and the secret sauce hidden in a lot of antivirus products being sold under other names)- offers their F-Prot for DOS scanner free for personal use.<br /># It's ideal for making a rescue CD so you can scan the system from a clean boot.<br /># <a href="www.mcafee.com/ ">McAfee AVERT Stinger</a> - McAfee AVERT Labs offers a handy utility to run in Windows that cleans some of the more common malware.<br /># Microsoft Malicious Software Removal Tool - Microsoft offers a free tool to remove prevalent software active on the system. The tool is offered via Automatic Updates, Windows Updates, and Microsoft Updates, or it can be manually downloaded using the provided link.<br /># <a href="http://www.symantec.com/business/security_response/removaltools.jsp">Symantec Virus Removal Tools</a> - Antivirus vendor Symantec offers a wide range of free cleaning tools for individual malware removal.<br /># F-Secure Virus Removal Tools - Another good choice for individual malware removal are these free tools from F-Secure.<br /># For a second opinion scan or a not-so-stubborn infector, try one of the Top Online Scanners.<br />Free Virus Repair and Prevention Tips<br /># How to Repair a Boot Sector Virus - Though boot sector viruses are rare in the U.S. and most European countries, they are still prevalent in other parts of the world.<br /># How to Make an Antivirus Rescue CD - In case you missed it above, steps for creating an F-Prot CD.<br /># http://antivirus.about.com/library/weekly/aa011902a.htm - Prevention. Prevention. Prevention. These are the essential steps.<br /># How to Make Sure Your Antivirus is Working - Viruses, worms, and trojans often disable your antivirus software when they infect your system. This prevents the antivirus software from being updated and detecting the presence of the malware. Here's how to check to ensure it's working.<br /># How to Avoid Macro Viruses - From the SANS Institute, tips on avoiding macro viruses.<br /># How To Prevent <a href="http://en.wikipedia.org/wiki/Computer_worm">Email Worms</a> - Security configuration changes you need to make to your favorite email client software.<br /># IM Safety Tips - In some crowds, instant messaging (IM) is more popular than email. But IM carries its own set of risks. These tips will help reduce the risk.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-53296879680542631072008-05-15T04:58:00.001-07:002008-05-15T04:58:59.878-07:00Avast! Antivirus 4.8.1195 Professional EditionAvast! Antivirus 4.8.1195 Professional Edition <br />The professional solution to great protection avast! 4 Professional Edition represents the best antivirus protection avast! 4 Professional Edition comes with anti-spyware, anti-rootkit and strong self-protection built-in. It is designed to protect your valuable data and programs, as well as keep itself up-to-date and has the kind of built-in features that many vendors charge for additionally, or don’t include at all. Simply install and forget. All-inclusive, comprehensive protection avast! 4 Professional Edition includes ANTI-SPYWARE protection, certified by the West Coast Labs Checkmark process, to protect against the latest spyware threats and ANTI-ROOTKIT DETECTION based on the best-in class GMER technology, built in to the scan engine. No additional purchase is required. Simple to use and automated Just install and go. Automatic incremental updates provide real-time protection of your system, including web surfing. We’ve made avast! antivirus as simple to use as possible, while allowing full control of your security. fastddl.com - Fast direct downloadsAvast! Antivirus 4.8.1195 Professional Edition direct downloads.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-51913132492378558922008-05-15T04:52:00.000-07:002008-05-15T04:54:21.644-07:00Bitdefender total security 2008 V11 0 9 FREE Rapidshare Links for Download<strong>Bitdefender total security Real-time Antivirus Protection </strong>Protects your PC in real time from known viruses, spyware and other malware with hourly updates Proactive Protection Blocks unknown viruses using advanced proactive detection techniques Anti-Rootkit Detects and removes the newest breed of hidden threats known as rootkits Gamer Mode Provides a smooth gaming experience by reducing the system load to a minimum Privacy Protection Reduces the risk of identity theft by preventing personal information leaks via e-mail or web. Anti-Spyware Monitors and prevents spyware threats in real-time Web Anti-Phishing Protects against phishing attacks by filtering all accessed web pages for fraud attempts Firewall Protection Controls applications Free rapidshare downloads on rapidsharereactor.comBit defender total security 2008 V11 0 9 FREE Rapidshare Links for Download rapidshare download.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-39799290294202475442008-05-15T04:51:00.000-07:002008-05-15T04:52:11.349-07:00Kaspersky Internet Security 2009 v8.0.0.357<strong>Kaspersky Internet Security </strong>2009 is a Totally New Approach to Data SecurityWith Key valid till 17. 03. 2009Product contains 6 main subsystems, and each of those includes basic protection components:1) System watch. System watcher (all-in-one system for registering events).- HIPS (host intrusion prevention system - proactive defense, which is based on limiting application actions on a system)- PDM (system of proactive defense, which is based on application behavior analysis for malicious/suspicious activities)- Firewall (personal protection screen)2) Malware protection- Protection of files and memory (File-Antivirus)- Protection of email and IM (Mail-Antivirus)- Protection of WEB (Web-Antivirus)3) Online Security- Protection from Phishing (Anti-Phishing)- Protection against network attacks (IDS)- Protection from auto-dialers (Anti-Dialer)4) Content zxcing- Spam zxcing (Anti-Spam)- Banner zxcing (Anti-Banner)- Parental Control5) On Demand Scanning (Scan tasks)6) .Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-30674306793223923532008-02-11T11:33:00.000-08:002008-02-11T11:36:32.994-08:00Antivirus website of AvSoft caused Virus download<span style="font-weight:bold;"> AvSoft</span> Technologies, an <span style="font-style:italic;">antivirus</span> developer based in India, had a unique problem recently when its web site started delivering a virus to its customers. The malware was first detected by security company <span style="font-style:italic;">AVG</span> and reported by its CRO (chief research officer) Roger Thompson. The<span style="font-style:italic;"> malware </span>is part of the Virut family of viruses and hacks.<br /><br />According to Thompson, the hackers used a vulnerability that can affect any server - an iFrame hack. By hacking an opening in an iFrame window in the server, the visiting customer can then be redirected to another server containing <span style="font-style:italic;">malware</span>.<br /><br />iFrames are a standard way to put content in place in a webpage. It is the ability to create an invisible iFrame window that makes them a tool of choice for new hackers. It’s hard to fight against what you can’t see, after all.<br /><br /><span style="font-weight:bold;">AvSoft </span>is the developer behind SmartCOP an Smartdog antivirus software. It is virtually unknown in the United States, doing most of its business in Asia. The news would not have made headlines in the States, except that it illustrates a new threat to companies that have web servers - the invisible iFrame hack.<br /><br /><span style="font-style:italic;">McAfee Security</span> Research Manager Dave Marcus believes that the site was compromised by exploiting a Web programming error, most likely in the site’s SQL or PHP code. Security experts say that criminals have written automated programs that scour the Web for these types of flaws and then automatically infect sites, making this an increasingly common problem.<br /><br />The code was first discovered in the downloads portion of the SmartCOP website. There is no comment from the company on the problem as yet, and no word on if the virus has been removed or not.<br /><br />Source-Yahoo!NewsNagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-79951482296206285502008-02-06T05:33:00.000-08:002008-02-06T05:35:35.600-08:00How to Delete Trojan HorseSince <span style="font-weight:bold;">Trojan horses</span> have a variety of forms, there is no single method to <span style="font-style:italic;">delete</span> them. The simplest responses involve clearing the <span style="font-style:italic;">temporary internet files</span> on a computer, or finding the file and deleting it manually. Normally, <span style="font-style:italic;">anti-virus software</span> is able to detect and remove the trojan automatically. If the antivirus cannot find it, Rebooting the computer in Safemode (with or without networking) may allow an<span style="font-style:italic;"> antivirus program</span> to find a <span style="font-weight:bold;">trojan </span>and delete it.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-6109428019544258872008-01-29T03:02:00.000-08:002008-01-29T03:05:27.254-08:00Easy Tips to remove SpywareThis article gives some simple tips to clean <span style="font-weight:bold;">spyware</span> off the computer. <span style="font-style:italic;">Cleaning the cache </span>can help get rid of how where one has been that people can use to exploit. How to get rid of this will depend on the browser and type of system one is using. The most effective way to get rid of the <span style="font-style:italic;">threats</span> will be to use an anti-virus and <span style="font-weight:bold;">anti-spyware</span> program. Some programs will only find the malicious files after a scan has been perform. This means that every time one surfs the net will want to run a scan to make sure one is parasite free. Most large companies like Norton and <span style="font-style:italic;">McAfee</span> add this into their protection policy. <br /> <br />Anyone who has ever experienced the pain of getting a virus on their computer knows the dangers of hackers and virus. And the worst thing is that anyone can be vulnerable to getting <span style="font-weight:bold;">viruses</span>. The internet makes it possible for any computer to get a virus, if, that is, you have a computer without virus protection. Luckily, there are great programs that can help prevent getting viruses. If you don't have an anti-virus program it's about time you got one! So here are some tips for choosing an anti-virus program.<br /><br />First, <span style="font-style:italic;">anti virus</span> protection software must be able to detect 100% of all possible <span style="font-style:italic;">virus threats</span>. To find out which software meets this requirement, go to AV-Test.org, which performs extensive testing of viruses. You also want to get some protection that is affordable, and offers upgrades at little or no cost. If you use email, instant messaging or file sharing applications, you'll need some extra measures of protection.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-63581182672133990992008-01-15T10:59:00.000-08:002008-01-15T11:02:55.812-08:00Computer wormA <span style="font-weight:bold;">computer worm</span> is a self-replicating computer program. <span style="font-style:italic;">It uses a network to send copies of itself to other nodes </span>(computer terminals on the network) and it may do so without any user intervention. Unlike a <span style="font-weight:bold;">virus</span>, it does not need to attach itself to an existing program. <span style="font-weight:bold;">Worms</span> almost always cause harm to the network, if only by consuming bandwidth, whereas<span style="font-weight:bold;"> viruses </span>almost always <span style="font-weight:bold;">corrupt</span> or modify files on a targeted computer.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-40928414654509836562008-01-12T12:31:00.000-08:002008-01-12T12:33:54.788-08:00Microsoft says Gmail is a virus<span style="font-weight:bold;"> Microsoft</span> has started flagging <span style="font-weight:bold;">Gmail </span>as a virus in their virus scanning software <span style="font-weight:bold;">Windows Live OneCare</span>. Many people are reporting that every time they open Gmail, a warning is displayed telling the user they are infected with "BAT/BWG.A".<br /><br />Now, either Gmail is a virus(ofcurse not), or Microsoft is generating <span style="font-style:italic;">false positives.</span> Some affected by this "virus" say other <span style="font-weight:bold;">anti-virus products</span> do not pick up the infection — to me, this is a bit suspicious.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-26611188425964487012008-01-12T12:24:00.000-08:002008-01-12T12:29:56.803-08:00virus testThe EICAR virus test is a harmless text file that is detected as a virus by most AV vendors. You can use it to verify that your local virus scanner is working (just copy the string into a plain text file), check to see if your email server scans for viruses (email yourself a copy), and test if scanners detect viruses inside archives (put it inside a zip file).Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-79836090813781824732008-01-04T06:53:00.000-08:002008-01-04T06:58:58.732-08:00Common types of virusesThere are a variety of computer virus available now.Most common types of viruses are mentioned below:<br /><br /><span style="font-weight:bold;">Resident Viruses</span>: This type of virus is a permanent which dwells in the RAM memory.<br /><br /><span style="font-weight:bold;">Direct Action Viruses </span>: The main purpose of this virus is to replicate and take action when it is executed.<br /><br /><span style="font-weight:bold;">Overwrite Viruses</span> : Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.<br /><span style="font-weight:bold;"><br />Boot Virus </span>: This type of virus affects the boot sector of a floppy or hard disk.<br /><br /><span style="font-weight:bold;">Macro Virus</span> : Macro viruses infect files that are created using certain applications or programs that contain macros.<br /><br /><span style="font-weight:bold;">Directory Virus</span> : Directory viruses change the paths that indicate the location of a file.<br /><br /><span style="font-weight:bold;">Polymorphic Virus</span> : Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.<br /><br /><span style="font-weight:bold;">File Infectors</span> : This type of virus infects programs or executable files (files with an .EXE or .COM extension).<br /><br /><span style="font-weight:bold;">Companion Viruses</span> : Companion viruses can be considered file infector viruses like resident or direct action types.<br /><span style="font-weight:bold;"><br />FAT Virus</span> :The file allocation table or FAT is the part of a disk used to connect information and is a vital part of the normal functioning of the computer.<br /><span style="font-weight:bold;"><br />Worms </span>: A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses.<br /><br />Download Best Antivirus softwares for free at <a href="http://www.antivirus1234.com">antivirus1234.com</a>Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-60721495741881954352007-11-26T04:54:00.002-08:002008-01-12T12:43:14.775-08:00List of Antivirus Software ProductsThese are avilable<span style="font-weight:bold;"> Antivirus Software</span> -<br />avast!<br /><br />Avira<br /><span style="font-weight:bold;">AVG Anti-Virus<br />BitDefender</span><br />BullGuard<br />Cisco Security Agent<br />Dr.Web<br />eScan Antivirus<br />FRISK Software International<br />F-Secure<br />K7 AntiVirus<br />Kaspersky Anti-Virus<br />LinuxShield<br /><span style="font-weight:bold;">McAfee VirusScan<br />NOD32</span><br />Norman ASA<br /><span style="font-weight:bold;">Norton AntiVirus<br />Panda Security<br />PC Tools AntiVirus</span><br />Prevx<br />Protector Plus<br /><span style="font-weight:bold;">Quick Heal Antivirus</span><br />Rising AntiVirus<br /><span style="font-weight:bold;">Sophos Anti-Virus<br />Symantec AntiVirus</span><br />Trend Micro Antivirus<br />Vba32 AntiVirus<br />Virus Chaser<br /><span style="font-weight:bold;">Windows Live OneCare<br />ZoneAlarm Antivirus<br /></span>Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0tag:blogger.com,1999:blog-7350439075753374109.post-72726641980571279312007-11-26T04:54:00.001-08:002008-01-12T12:45:00.634-08:00VirusA <span style="font-weight:bold;">virus </span>(from the Latin virus meaning toxin or poison) is a sub-microscopic infectious agent that is unable to grow or reproduce outside a host cell. Virus diseases inflict a heavy illness and economic burden on humans and animals and can devastate agricultural crops. Each viral particle, or virion, consists of genetic material, DNA or RNA, within a protective protein coat called a capsid. Their shape varies from simple helical and icosahedral (round) forms to more complex structures with tails or an envelope. Viruses infect cellular forms of life, and they are separated into animal, plant and bacterial viruses.<br />It has been argued whether viruses are living organisms. Some consider them non-living as they do not meet the criteria of the definition of life. For example, unlike most organisms, viruses do not have cells. However, viruses have genes and evolve by natural selection. They have been described as organisms at the edge of life. Viral infections in human as well as animal hosts, usually result in an immune response and disease. Often, the virus is completely eliminated by the immune system. Antibiotics have no effect on viruses, but antiviral drugs have been developed to treat life-threatening infections. Vaccines that produce lifelong immunity, can prevent virus infections.Nagpur Bird Racehttp://www.blogger.com/profile/00710004625030378594noreply@blogger.com0