Software/Data

Different Virus Description & Characteristic Part 3

Continuation...........

MALICIOUS UTILITIES

These utilities are designed specifically to inflict damage.However, unlike other malware programs, they do not perform malicious actions immediately as they are run and can be safely stored and run on the user's computer.Such programs have functions used to create viruses, worms and Trojan programs, arrange network attacks on remote servers, hacking computers or other malicious actions.

There are many types of malware utilities with different functions.

Their types are described in the table below.
Click to download table in PDF form

POTENTIALY UNWANTED PROGRAMS
Potentially unwanted programs, unlike malware programs, are not intended solely to inflict damage.However they can be used to breach the computer's security.

Potentially unwanted programs include adware, pornware and other potentially unwanted programs.
ADWARE

Adware programs involve display of advertising information to the user.They display ad banners in other program's interface and redirect search queries to advertising websites.
Some adware programs collect and redirect to their developer marketing information about the user, for example, which sites he or she visits or which search requests he or she performs (unlike Trojan spies, these programs transfer this information with the user's permission).

PORNWARE

Usually, users install such programs themselves in order to search for or download pornographic information.

Intruders also can install these programs on the user's computer in order to display ads of commercial pornographic sites and services to the user without his or her permission.

To be installed, they use vulnerabilities of the operating system or web browser, Trojan downloaders and Trojan droppers. There are three types of pornographic nature distinguished based on their functions.

These types are described in the table below.
Click to download table in PDF form

OTHER RISKWARE PROGRAMS

Most of these programs are useful programs used by many users. They include IRC clients, dialers, file downloading programs, computer system activity monitors, utilities for working with passwords, FTP, HTTP or Telnet service internet servers.

However, if an intruder obtains access to these programs or install them to the user's computer, such intruder can use some of their functionality to breach the security. Other riskware programs are classified depending on their functions.

Their types are described in the table below.
Click to download table in PDF form
Until on my next post!

August 1, 2009

Different Virus Description & Characteristic Part 2

Continuation...........

TROJANS

Unlike worms and viruses, trojan programs do not create copies of themselves. They sneak into a computer, for example, via e-mail or using a web browser when the user visits an "infected" website. Trojan programs are launched by the user and start performing their malicious actions as they run.

The behavior of different trojan programs in the infected computer may differ. The major functions of Trojans are blocking, modification and erasing of data, disruption of the operation of computers or computer networks. Besides, Trojan programs can receive and send files, run them, display messages, access web pages, download and install programs and restart the infected computer.

Types of trojan programs and their behavior are described in the table below.

Click to download table in PDF form

Different Virus Description & Characteristic

Everyday new viruses is being spread over the net and most of this viruses are difficult to neutralize in one's PC.So, I was thinking to run description summary in some of the characteristics of this malicious programs(viruses) for you to have better understanding.

Viruses are categorize into two, these are the Potentially Unwanted Programs and Malware Programs.I will focus more in the malware programs category since this is that bring most damage to one's PC.

Potentially Unwanted Programs-are created not intended solely to inflict damage. However they can be used to breach the computer's security, includes adware, pornware and other potentially unwanted programs.

Malware Programs
-are created with the purpose to damage a computer and its user, for example, to steal, block, modify or erase information, disrupt operation of a computer or a computer network.It is further divided into three subcategories: viruses and worms, Trojans programs and malware utilities.

1.Viruses and worms can create copies of themselves which are, in turn, capable of creating their own copies. Some of them run without user's knowledge or participation, others require actions on the user's part to be run. These programs perform their malicious actions when run.

2.Trojan programs do not create copies of themselves, unlike worms and viruses. They sneak into a computer, for example, via e-mail or using a web browser when the user visits an "infected" website. To be launched they require user's actions and start performing their malicious actions as they run.

3.Malware utilities are created specifically to inflict damage. However, unlike other malware programs, they do not perform malicious actions immediately as they are run and can be safely stored and run on the user's computer. Such programs have functions used to create viruses, worms and Trojan programs, arrange network attacks on remote servers, hacking computers or other malicious actions.

Viruses and Worms Sub-Category

A classic virus infiltrates into the system, it infects a file, activates in it, performs its malicious action and then adds copies of itself into other files.It reproduce only on the local resources of a certain computer, they cannot independently penetrate other computers. They can penetrate other computers only if it adds its copy into a file stored in a shared folder or on a CD or if the user forwards an e-mail messages with at infected attachment.

Code of a classic virus can penetrate various areas of a computer, operating system or application. Based on the environment, there is a distinction between file, boot, script and macro viruses.

Viruses can infect files using various methods. Overwriting viruses write their own code replacing the code of the file they infect and after they destroy the content of such file. The infected file stops working and cannot be disinfected. Parasitic viruses modify files leaving them fully or partially operating. Companion viruses do not modify files but create their duplicates. When such infected file is opened, its duplicate, that is the virus, will be run. There are also link viruses, (OBJ) viruses that infect object modules, viruses that infect compiler libraries (LIB), viruses that infect original text of programs, etc.

Worms - After it penetrates the system, the code of a network worm, similarly to the classic virus code, gets activated and performs its malicious action. The network worm received its name due to its ability to tunnel from one computer to another - without the user's knowledge - to send copies of itself through various information channels.

The major method of proliferation is the main attribute that differentiates various types of worms. The table below lists types of worms based on the method of their proliferation.

Click to download table in PDF form


To be continued...............

Why defragmentation is a must?


Over time, as you delete and save files to a hard disk, the files become fragmented. This means that they are split into many non contiguous areas on the disk.One of the best ways to protect both your hard disk and the data on it is to periodically defragment the files on the disk. This serves two purposes. One is that by ensuring that all of the files are stored in contiguous sectors on the disk,head movement and drive wear and tear will be minimized.This has the added benefit of improving the speed which files will be retrieved from the drive by reducing the head thrashing that occurs every time a fragmented file is accessed.The second major benefit of a fragmented disk is that in the case of a disaster where FAT and root directory is severly damage, the data on the drive can usually be recovered very easily if the files are contiguous.

Note: Cleaning your registry and your temporary internet files folder is another way of optimizing system performance.

Restoration of backed up data from Outlook Express



You have a new OS, its time to bring back the data, address book and your internet settings account to your harddrive.In the case of your address book and internet account settings just simply follow step 1 and 2 of my previous post, but instead of clicking export click import, then go to the path were your back-up files is located. The last step is restoration of all your mailbox folders.At the file menu(refer to graphic above) click file>import>messages>select program "Microsof Outlook Express 6" then click next> select "Import mail from OE6 store directory" then click OK> Browse to the outlook express you backed up> click next to restore all your OE data(inbox, sent items, drafts ......etc).You may opt to restore your folders selectively.

How to back-up your Outlook Express Messages & Address book (Part 1)

Today I will feature procedure in backing up "outlook express" data, address book and its mail settings account. This procedure is very useful if you are planning to reformat your drive and dont want to loss a single data.

Step 1: Procedure in backing up Address book:Open outlook express >(at the menu bar) click tools > click address book >click file> click import> select address book(wab) > then it will prompt you were to save the files(you can name it whatever you want)
Step 2: Procedure in backing up Internet accounts settings:The next process is backing up your internet account settings.(These are the user name,password, pop and smtp settings..etc)Click tools again of your outlook express> click accounts>click Mail Tab>click import> enter a file name and save it to a folder.


Step 3: Now we are almost done,the last part is saving all your folders at outlook(inbox,sent items...etc).Be careful on following the procedure to avoid wrong saving of data. First identify the path where's the mailbox of your outlook is located.Open outlook express,at the left side of it,you can see the "folders"window.Put you mouse pointer on the "inbox" folder,then right click on it then click properties> at the property window click the mouse as indicated on the illustration(Refer to graphic above) and scroll sideward until you reached at the end, take note of the exact location of the folder. Now using windows explorer follow the folder path until you reach the exact mailbox location of your outlook express. Take note that before you follow the path of your mailbox location be sure to set your files settings to "view all files at the folder options" otherwise you cant see it since its a hidden folder.Once you found out the folder, save the whole folder to a specific location(Normally its labeled "Outlook Express").Now you can save those 3 data to a backup harddrive then reformat your hard drive. Take note that the procedure in backing up those mentioned data can be in any order. I will discuss the procedure in restoring those data on my next pos