Sunday, March 13, 2011

Virut

You do not look lightly on this one virus. Never mind the usual administrators, Vaksinis (Vaksincom technicians) who every day struggling with the virus and the daily food (other than rice) is to conduct onsite visits to eradicate the virus Vaksincom corporate customers throughout Indonesia, if the customer gets the task of visiting an infected Virut, they directly excited. This is not because there is an estimated or because the employee visited the office beautiful, but because, kalaukomputer Virut already infected, that means they will almost certainly overtime. Just look at the action. After successfully infected, she will direct the host to delete it.

Virut will infect all exe files, not to mention the Windows OS files and, in so many files that were infected and so the complexity of the problems caused, some antivirus vendors even suggest aka Pasopati step format and reinstall Windows if you are infected Virut.

In addition, Tanah Abang like thugs who once controlled a territory would invite his friends, Virut also be downloaded belasanvirus, new spyware from dozens of sites on the Internet. That way, once infected Virut, cleaner needed Virut not only cleaner, but also cleaner semuavirus and malware. 

If you think have suffered enough, you're wrong. Virut also replace the file tcpip.sys and NDIS.sys which resulted in you will not be able to connect to the network if you delete files hosted Virut. 

More sophisticated, Virut not change the original date of files so you can not detect the files on the infection of it by seeing "Date Modified" or the last modified file in Windows Explorer. However, what happens is changing the size of infected files it, be increased by about 22 KB. To know this, you should compare the same files your computer with other computers.


Saturday, March 12, 2011

This He Latest Computer Virus World disturbing

Computer and Internet security firm, NetWitness states that there is a new type of computer virus that is currently emerging and troubling world. The virus is called 'kneber botnet' is able to collect passwords to access online financial, social networking sites and email systems from computer bervirus and report information that gets to the hacker.

According to Chief Executive Officer of NetWitness Amit Yoran, there are about 75,000 computers belonging to 2500 organizations in the world that has been infected with botnets.

This virus was found in January 2010 and considered very dangerous because the conventional way of protection against viruses is not enough to counteract the botnet to work on computers that are healthy.

The race by hackers to create viruses latest computer apparently still continues and has claimed casualties is not small. I do not know how many companies or organizations who burglarized because of them and seemed to "war" is not showing signs of ending.


Latest Computer Virus a sensational New York

A new virus has been found, and classified olehMicrosoft as the most destructive! The virus was discovered on Sunday afternoon by McAfee, and have not found a vaccine for defeat.

This virus destroys Sector Zero from the hard disc, a save function vital information. This virus runs as follows: This virus will be automatically sent to all names in your address list with the title A Card For You (Une Carte Pour Vous, or A Card For You), so virtual card is opened, the virus that will freeze the computer so the user has to reboot if you hit CTRL + ALT + DEL or command to restart, the virus destroys Sector Zero from the hard disk boot, so the hard disk will be permanently damaged.

The virus within several hours has caused panic in New York. This warning has been received by the employees of Microsoft itself.

Do not open e-mail with the title A virtual card for you (Une Carte Virtuelle Pour Vous or A Virtual Card For You)

Friday, March 11, 2011

9 Tips Get rid of Virus Sality

Not all antivirus programs to clean up files that have been infected with the virus W32/Sality.AE. In fact, can-can, the file will be destroyed after being scanned and cleaned by the antivirus that is not appropriate.

Sality virus will spread quickly through a network share by using the default Windows folder or share that has full access by way of infected files that have extensions exe / com / scr.

For that, security companies Vaksincom suggest that computer users to disable the default share (C $, D $ .. etc) and avoid full folder sharing on your network.

Here are 9 ways to clean the virus W32/Sality.AE brief received from analysts detikINET Vaksincom virus, Adang Jauhar Taufik :

1. Disconnect the computer that will be cleared from the network and the Internet.
2. Turn off System Restore during the cleaning process takes place.
3. Turn off the Autorun and Default Share. Please download the file and run the following ways: right-click and then install repair.inf.
4. Turn off the active application program in memory so that the cleaning process faster, especially programs that exist in the startup list.
5. We recommend that you scan by using the removal tools with the first extension of the removal tools with an extension other [for example: CMD] for not re-infected by W32/Sality.AE.
6. In order for a computer that is infected W32/Sality.AE to boot safe mode, please restore the registry has been changed by the virus. Please download the following files and then run the OS that is infected W32/Sality.AE.
7. Fix another registry is modified by a virus, please download the following tools and then run the file by right click then install repair.inf
8. Restart the computer and re-scan using removal tools to ensure your computer has been clean from viruses. 
9. For optimal cleaning and prevent re-infection should install and scan with the antivirus can detect Sality well.

Sality, Virus Number One In Indonesia

Based on the release of virus received by the editor mentioned that allegedly came from Taiwan / China is ranked first conclusively together with Conficker. 

According Vaksincom, really annoying if all the programs we participate eaten by a virus (infected, red), as well as difficult to eradicate the virus sometimes also the files that have been in the injection can not be used aliases broken after the scan and cleaned by the antivirus, consequently have to reinstall all the programs an error or re download the files you have these injections.  

One of the viruses that will inject the exe file / com / scr is W32/Sality.AE. 

This virus will try to block the removal tools or antivirus program while running and trying to block the task manager or "registry editor" of Windows. To simplify the process of spreading than utilizing the "File Sharing" and "Default Share" This virus also will use the media Flash Disk with how to create random files that have extensions exe / com / scr / PIF and add an autorun.inf file that allows the virus can be active automatically every time the user access the Flash Disk.

The greatness of this one virus, among others, will try to kill processes related to security, especially antivirus programs by turning off the process, block that the user can not access the websites of several antivirus and blocks the task manager or registry tools. Medium to "defend" itself, W32/Sality.AE will also try to block access to the mode "safe mode" so that the user can not boot in mode "safe mode". 

Based on the observation Vaksincom, until now carrying thousands of computers already infected with the virus Sality which caused damage or loss of data.

Thursday, March 10, 2011

How it Works Antivirus Software

Antivirus software scans the contents of computer hard disk in two ways. If there are known viruses (ie viruses known to exist and antidotes have been found) the software will look for the signature (sign) of viruses - that is a unique string of bytes that identify a virus program virus like a fingerprint - and will throw from your system. Most scanning software does not just look for the early type virus, but also to look for variants of the virus, because the code of the virus signature is usually similar. 

In the case of a new virus that has not found its antidote, anti-virus software will run a heuristic program that searches for virus-like activity on your system. When the program saw no symptoms of anything wrong, it will quarantine the troubled program and will display a warning message to you about what will be done by the program (such as changing your Windows registry.) When you and the software felt that the program is a virus, you can send files that have been terkarantina at antivirus software vendor for analysis, determining signature, name it and put it in the catalog, and send her an antidote. The virus is now known viruses. 

If the virus does not appear again - this often happens because the virus is not well written to be distributed - the vendor would categorize it as a dormant virus (viral sleep). But some viruses spread like an earthquake: The spread initially always accompanied with the occurrence of aftershocks. Variants of the virus (viral tracing the spread of the virus that emerged after the first) will increase the number of types of viruses that exist.

HOW TO REMOVE VIRUS SHORTCUT

Here are 8 practical steps to kick the virus is able to change the folder that is in the USB flash disk into the shortcut:

1. Disable 'System Restore' for a while during the cleaning process.
2. Decide who will clean your computer from the network. 
3. Turn off the virus active in memory by using the tools 'Ice Sword'. Once the tools are installed, select the file that has the icon 'Microsoft Visual Basic Project' and click 'Terminate Process'. Please download these tools at http://icesword.en.softonic.com/ 4. Delete the registry that has been created by the virus by: -. Click the [Start] -. Click [Run] -. Type Regedit.exe, and click the [OK] -. In the Registry Editor application, browse the key [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Run] -. Then delete the key that has the data [C: \ Documents and Settings \% username%]. 
5. Disable the autoplay / autorun Windows. Copy the script below in notepad and then save it as repair.inf, install the files in the following manner: Right-click repair.inf -> INSTALL
[Version]
Signature = "$ Chicago $"
Provider = Vaksincom
[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del
[UnhookRegKey]
HKLM, Software \ CLASSES \ batfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ comfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ exefile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ piffile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ regfile \ shell \ open \ command,,, "regedit.exe"% 1 ""
HKLM, Software \ CLASSES \ scrfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer NoDriveTypeAutoRun, 0x000000ff, 255
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer NoDriveTypeAutoRun, 0x000000ff, 255
 
6. Delete Files parent and duplicate files are created by the virus included in the flash disk. To expedite the search process, you can use the 'Search'. Before conducting the search should show all hidden files by changing the Folder Options settings. 
7. Show re-folders have been hidden by the virus. To speed up the process, please download the tools Unhide Files and Folders in http://www.flashshare.com/bfu/download.html. 
8. Install security patches 'Microsoft Windows Shell shortcut handling remote code execution vulnerability, MS10-046'. Please download the security patch at http://www.microsoft.com/technet/security/Bulletin/MS10-046.mspx 

Wednesday, March 9, 2011

Practicing Using Computers Safely

The best way to protect yourself [er, computer] you from a virus is if you have a connection to the Internet, do not open e-mail attachments from strangers and avoid downloading from sources that are not clear. Opponent wants you to click, double the content of your mailbox. And when you get a file attachment and you do not ask, ask the sender about the contents of attachments and how to use it before it opened.

To tighten security, you need to install a reliable anti-virus scanning software and always download the updates regularly. Major antivirus software vendors, like Symantec, Network Associates, Computer Associates, and Kaspersky Lab, providing regular updates (as the note is Computer Associates InoculateIT antivirus software free of charge). Some vendors also offer regular updates via their company Web sites.

Update on a regular basis is very important. Researchers from the Computer Economics estimates that 30 percent of small businesses are particularly vulnerable to the dangers of viruses and it is because they do not update their antivirus software regularly or they did not install it correctly.

SmadAV 2011 Rev 8.4 released !!!

SmadAV 2011 Rev. 8.4: Detection of virus specific to some new shortcuts (MSO-sys, fanny-bmp), the addition of 40 new virus database, enhanced shortcut detection of all variants of the virus, the addition of heuristic techniques, etc. 

SmadAV Rev. 2010. 8.3: Addition of 40 new virus database, all variants of the virus cleaning shortcuts, and many other new features.

2011 SmadAV Rev. 8 was released with many new features and improvements that are specific to local eradication of the virus. Features such as Smad-Behavior that can identify new local virus that does not exist in database SmadAV of his behavior when infecting the system. Smad-Ray that can scan automatically flash when installed within a maximum of 5 seconds. SmadAV 2011 less stable and highly recommended to be combined with international anti-virus because it can only handle SmadAV local virus. Immunization flash (using autorun.inf folder) has been revised and previously there will be a confirmation so you can decide whether a flash is to the right or not sterile.

For information, the virus samples that users uploaded to the site Smadav.net, local spread of the virus is starting to fall dramatically in Indonesia. Perhaps this is due to the many local antivirus that can eradicate local viruses. And also because the users of Windows XP that have been reduced because some had to upgrade its operating system to Windows Vista or Windows 7 a very safe from viruses, especially viral infections locally. The spread of the virus in Indonesia, more dominated by viruses and malware international SmadAV certainly can not be overcome. You must and highly recommended to use the international anti-virus to keep your computer from viruses and malware of this international


Tuesday, March 8, 2011

Beware of Computer Virus Brings Friend

Computer viruses this one includes unique. Not only interfere with the victim, the virus also has the ultimate weapon is more dangerous. If the victim's computer connected to the internet, the virus will download other viruses.

Remarkably, the names and types of viruses that are downloaded is different for each target computer either from the name and size. This is what causes many antivirus programs although difficult to perform detection and cleaning. If the file is successfully downloaded, it will automatically activated on the computer and perform a series of malicious code that has been planted in his body. 

In general the class of virus trojan / backdoor is a bit tedious. He will always connect to the internet to call a predetermined website address which will be shown continuously causing a computer to be slow. When accessed this virus will inject a file that has the extension EXE, DLL, and HTM / HTML either program files or Windows file system so that needed special cleaning steps.

History Of Virus

The virus, which first appeared in the world in berinama "Elk Cloner" was born about 1981 in TEXAS A & M. Virus "Elk Cloner" spread through Apple II floppy disks are operating this systemnya.Virus displaying a message on the screen: "It will of get on all your disks It will of infiltrate your-chips-yes it is the Cloner!-It will of stick to you like glue It will of-modify RAM too-send in the Cloner! " 

The name "virus" is given by Len Adleman on November 3, 1983 in a seminar that discusses how to create viruses and protect yourself from virus.Banyak who often assume that the virus, which first appeared is a virus "Brain" which was born in 1986.Ini due to virus This most appalling and most widely spread karean propagates through a DOS diskette that time again ngetrend. The birth of this virus is also in conjunction with the "PC-Write Trojan" and "Vindent". 

One year later appeared the first virus that infects file.Biasanya the attack was the *. exe files that have this virus named "SURIV" included in the class of viruses "Jerusalem". The speed of its spread is great enough, for the moment. But the virus is not very dangerous, because this virus hit and beat up the mainframe from IBM.

In 1988, emerged from a virus attack against Machintosh by a virus "MacMag" and "scores" and was in the dorm network ravaged by devastating man-made virus in 1989 is Robert Morris ini.Tahun prankster who sent the file "AIDS information program" and unfortunately, so the file was opened, which is obtained instead of info about AIDS, but the virus that mengenskrypsi hard drive and require payment for the opening code

In 1995 appeared the virus attacks that are categorized as large-scale attacks from viruses, attacks are aimed at large companies, such as Griffith Air Force Base, Korean Atomic Research Institute, NASA, IBM and many other giant companies that have been devastated by "Internet Liberation Front". Because of the courage and the magnitude of the attack, dubbed as the year 1995, the Hacker and Cracker. 
 

Monday, March 7, 2011

FOUND "the most dangerous computer virus"

A new virus has been found, and classified by Microsoft as the most destructive! The virus was discovered on Sunday afternoon by McAfee, and have not found a vaccine to defeat him. 

This virus destroys Sector Zero from the hard disc, which stores the function of vital information. This virus runs as follows:

• This virus will be automatically sent to all names in your address list with the title "A Card For You" (Une Carte Pour Vous, or A Card For You 
• so virtual card is opened, the virus that will freeze the computer so that the user has to reboot if you hit CTRL + ALT + DEL or command to restart, the virus destroys Sector Zero from the hard disk boot, so the hard disk will be permanently damaged. 

According to CNN, the New York virus in a few hours already cause panic. This warning has been received by the employees of Microsoft itself.  

Woro-Woro:
• Do not open e-mail with the title "A virtual card for you" (Une Carte Virtuelle Pour Vous or A Virtual Card For You).
• Send this message to all your friends. I think that most people, like myself, would rather receive this notice 25 times than not at all.


CAUTION!
Do not accept contacts "pti_bout_de_ chou@hotmail.com". This is a virus that will reformat your computer. Send this message to all those who are in your address list. If you do not do it and one friend put it in the list address, your computer will also be affected.

 

Popular Posts