Posts

Showing posts with the label Viruses

Help With Websites Infected With Viruses

Recently several websites are reporting very suspicious infection and anti viruses alerts when visiting some websites. Even recently if you use Firefox or Chrome and you visit one of those websites it came out as a red page alerting you not to go forward because the you could get infected with viruses or Trojans. And yes, it is exactly as that page says, the website you are trying to visit has been recoded including sort kind of encrypted JavaScript code inserted in almost any index page, this affect every index.html , index.htm , index.php and so and so, also it could be found into the .htaccess files used on Apache servers. The propagation The propagation method is simple, the virus infects a computer, download and install Trojans converting the infected computer in a zombi and adding it to a network awaiting for commands to process to send spam, generate DoS attacks or even worse, once this is done, the virus attack the FTP clients this computer could have in order to get a list of...

Computer Viruses - A Practical Joke That Become A Computer Security Issue

Do you know who Rich Skrenta is? Perhaps you will know him better by the name of Elk Cloner creator. Elk Cloner is the first computer virus and it was created for Apple II system and spread using the floppy disk. It all started twenty five years ago from what supposed to be a practical joke. Today, the viruses can do lots of damages such as making your computer crashes, deleting data, and reformatting your computer hard disk. The hackers and the cyber criminals use them for their own gain and to cause havoc worldwide. It needs a host to spread and therefore, it will attach itself to any legitimate programs in your system in order for it to replicate. If it successfully replicates itself in your system, it will take up a lot of system memory and your computer will crashes. Nowadays, this threat has become more sophisticated than before and you can get infected by doing nothing. It is different from a Trojan Horse because a Trojan Horse does not attach itself to any programs. If a Trojan...