Wednesday, August 28, 2013

Malicious Code

Malicious code, or malware, is a common name applied to all forms of unwanted and destructive software, such as viruses, worms, and Trojans. The best way to protect from malicious code is to install virus scanners and keep virus definition (signature) files current.

Virus: A virus is malicious code that infects or attaches itself to other objects or programs. All viruses have some form of replication mechanism, which is how they propagate.

Worm: A worm is malicious code that replicates by making copies of itself on the same computer or by sending copies of itself to another computer. Worms, unlike viruses, do not infect other program files on a computer. All worms have some form of replication mechanism, which is how they propagate. A worm does not require any host program unlike virus to execute, they can run independently.

Trojan: A Trojan horse is seemingly useful (or harmless) programs that perform malicious or illicit action then activated, such as destroying files. For example, user downloads what appears to be a movie or music file but he unleash a dangerous program which can erase in disk or can send his credit card numbers or password files to intruders. These backdoor programs may also open certain ports on user computer allowing unauthorized access to user computer.

The malicious code usually propagates through email attachments.

Key loggers

Key loggers are software application (or hardware based as well) which are able to capture the key logging events and can mail them to remote intruder via email. These are invisible and undetectable to users so there is a huge risk of sending important information such as credit card numbers passwords to the remote intruders. The set program can be combined with useful applications like that whenever user install that application the key logger program also get installed along with that application.

Bots
The term Bot is derived from the word “Robot”. Robot comes from the Czech word "robot," which means "worker". In computer world Bot is a generic term used to describe an automated process.

Bots are being used widely on the Internet for various purposes. Bot functionality may vary from search engines to game bots and IRC channel bots. Google bot is one such famous search bot, which crawls through the web pages on the net to collect information and build database to enable variety of searches. Computer controlled opponents and enemies in multiple player video games are also a kind of bot, where the computer process tries to emulate the human behavior.

However, the usage of bots is not limited to good purpose only. Bots are widely used to perform malicious activities ranging from information stealing to using as a launching pad for distributed attack. Such software’s gets installed on user’s computer without their knowledge. Some bot infected machines, pass the control of the machine to a remote attacker and act as per the attackers command. Such machines are popularly known as zombie machines.

Adware and Spyware
Adware is 'freeware', whereby ads are embedded in the program. These ads will show up whenever user opens the program. Most adware authors provide the free version with ads and a registered version whereby the ads are disabled. As such, the users have the choice, either to use the freeware with ads served or purchase the registered version. Spyware, as the name suggest is the software installed on user’s computer which is constantly sending user information to the mother website.

Spyware, however, is published as 'freeware' or as 'adware', but the fact that an analysis and tracking program (the 'spyware' agent, which reports user’s activities to the advertising providers' web site for storage and analysis) is also installed on user’s system when a user install this so-called 'freeware', and this is usually not mentioned. Even though the name may indicate so, spyware is not an illegal type of software. But what the adware and spyware providers do with the collected information and what they're going to 'feed' the user with, is beyond his control. And in some cases it all happens without the user’s consent.

Monday, August 26, 2013

Blocking and unblocking USB Ports

If you think that USB flash/pen drives are infecting your system with virus, then try to block all USB ports so that your system will not accept any USB flash/pen drives.

To do this
Type “REGEDIT” in RUN command window or if you are using latest Windows operating system you can type in Start up menu down run bar.
Then it opens system registry.

Now browse the Registry like this;
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR

Now Click mouse in the right side pane and double click on the registry key START and change the DWORD value as 4.

Now you can restart your computer to get effect of the changes in registry. Your USB devices are not accessible because your system USB ports are blocked.

By default DWORD value is 3.

To make your USB ports accessible do the same steps and change the value back to 3 (default value).

And restart your computer to check the effects.


Using BIOS
You can block USB ports even from BIOS setup itself.
This is very safe and effective.
To do this:

Start your computer and press ESC, F6, F8, F12 as mentioned in user manual to enter in BIOS Setup.
Once you enter in to BIOS Setup
Select “Advanced Options”
And check for the “External USB Ports” option DISABLE/ENABLE will be available.
Just change the option to DISABLE by using  + or – keys from your key board.
Restart your computer and check it.
Again when ever you want use USB Ports then goto BIOS Setup “Advanced Options” Change the “External USB Ports” option to default EANBLE by using  + or – keys from your key board.