Showing posts with label trojan. Show all posts
Showing posts with label trojan. Show all posts

Sunday, July 26, 2009

Scan Computer Online For Viruses

Here's my thought about scan computer online for viruses.

There are many online antivirus on the Web. Using one or all of them can help keep your computer clean of viruses, in May and to help detect viruses on your installed antivirus software might miss.

Symantec security check, for example, is an excellent online scanner. Offering not only antivirus software online, but also a complete scan of your computer security.

And it's absolutely free. You must accept an ActiveX control to use this resource.

In the current climate of the computer, especially if you spend much time online, it is important to have protection. However, a scanner can give you some more protection. It can also help if you use a program such as Avast free virus, which in May does not offer as much protection as Norton or McAfee.

First click the red "virus scan" icon. If you agree with Symantec's user agreement and privacy policy and agree to accept the ActiveX control, you're on your way to your scanner. This may take several hours, so be patient. The program will provide a full report when completed.

Once the virus is finished, click the yellow icon for Security Scan. The exploration will give you an idea of where their vulnerabilities are and how to solve them. Security Scan of your exposure to hackers and other threats, including Trojan horses, regular antivirus software can not protect against.

Trend Micro HouseCall is an online virus scanner free. It requires Active X or Java to work in your browser. You can choose between the plug-in browser or the Java version. Unlike Norton Antivirus online scan, Trend Micro HouseCall can effectively remove viruses from your computer system. Trend Micro HouseCall is the first on-line virus scanner for the ICSA Labs Certification

Kaspersky Anti-Virus free download also requires an Active X. However, if you have installed Kaspersky Online Scanner Pro, you must uninstall the browser-based or scanner will not work correctly. In addition, the software only works with Internet Explorer 6.0 or higher. The scanner uses heuristics to detect unknown viruses. Kaspersky does not remove the malicious code. Can not detect it.

Depending on the service you use, the virus probably take a long time. Even if you're browsing online, the team should download the software and virus definitions for your scanner to work properly. However, the virus scanners on the Internet is a valuable tool to keep your computer free against infections.

Wednesday, July 22, 2009

Three-pronged Trojan attack threatens security on the Internet.

Here another info about Trojan Attack.

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names of a modern day version of The Three Musketeers. These are Trojans engineered for a hacker attack that will infect computers
and open them for use in further attacks.

"Combating computer viruses is essentially a game of hide and seek," says Govind Rammurthy, CEO, MicroWorld Technologies, among the leading Security Solutions providers. "Hackers riding piggyback on viruses have only a short window of opportunity to maximize their gain before the viruses are detected, neutralized and logged into Virus Definition databases, 'vaccinating' the system against those strains.

Without continuing system vulnerability caused by virus infection there is little they can do to further their malicious ends like stealing personal information, credit card details and other sensitive and vital data. To achieve their ends they need to keep the system vulnerability going for more time. This co-ordinated Trojan threat is an attempt to the keep that 'backdoor' open, essentially buying time," he concludes.

Of the three, Glieder leads the initial charge. It sneaks past anti-virus protection to download and execute files from a long, hard-coded list of URLs and "plant" the infected machine with "hooks" for future use. On Windows 2000 and Windows XP machines, it attempts to stop and disable the Internet Connection Firewall and the Security Center service (introduced with Windows XP Service Pack 2). Then the Trojan accesses the URL list to download Fantibag. The way is now paved to launch the second stage of attack.

Sulabh, a tester with MicroWorld Technologies says of Fantibag, "Now Fantibag goes about attacking the networking feature of the infected system to prevent it from communicating with anti-virus firms and denying access to the Microsoft Windows Update site. It closes your escape route by making it impossible to download an anti-virus solution and any subsequent Windows security patch to your system. Effectively it helps Mitglieder (the third stage Trojan) open the 'backdoor' by shutting the other doors on you."

Mitglieder puts the system under complete control of the attacker by opening the 'backdoor' on a port using which the attacker can update the Trojan, to stay a step ahead of attempts to remove it, download and execute files, initiate an SMTP server to relay spam, execute files on the infected computer and download and execute files via an URL. "This is what makes it scary," say Aarti, Assistant Manager, QA, MicroWorld Technologies. "The fact that the system can now be used as a remote controlled 'soldier' (bot) in an army (botnet) of similarly compromised machines to launch criminally motivated attacks, causing harm to Internet users."

Botnets thus formed can among other things, use your machine to launch Distributed Denial of service attacks which overload servers, making them crash, to send out spam, spread new Malware, plant Keylogger to retrieve your personal information like identity, passwords, account numbers etc., install Spyware, manipulate online polls/games, abuse programs like Google AdSense to cheat advertisers of revenue, and install Advertisement Addons for financial gain as in fake websites advertising services that don't exist.

"Botnets can even encompass over 50,000 host machines. The potential for mischief is huge," reflects Govind Rammurthy. "Such a three-pronged Trojan attack where attackers change their virus code and release viruses quickly to bypass virus signature scanners, then disable network access to deny the user link-ups to anti-virus and Microsoft Windows Update site for protection has huge significance for virus-signature based protection. It is a sign of things to come," he says, remembering the scramble at MicroWorld labs to update their products to detect and remove the three Trojans.

Anti-virus updates for the three-pronged Trojan threat are available at MicroWorld Technologies site.
Maybe the time for worrying about some pimply teenager turning out malicious code because they have nothing better to do on a nice sunny morningFree Web Content, is over. The world could be facing a determined organized crime syndicate who'll stop at nothing to get what they want - information precious to you.

Tuesday, July 21, 2009

ZLOB - The trojan virus

Zlob is a virus of Trojan horse which attacks your systems as Active X.

What is Zlob?

Zlob is a virus of Trojan horse which attacks your systems as Active X. Once these Trojans get installed it shows some adds of pop ups. The ads which these Trojans show will be same as that of warning popup of windows. Later the user will also be informed that his system has been spyware infected. On clicking at the ads of these popup some pirated programs of anti-spyware gets automatically downloaded for ex: MS Antivirus, Virus heat etc. The Trojan horse will be well hided in this stuff which you download.

Discovery:

It was discovered for the first time on 23rd of April in the year 2005. It was updated for the first time on 1st of June in the year 2006. From the mid of the year 2006 it was highlighted.

From which sites the Zlob attacks?

It is mainly found in some sites for messaging and gaming. In messaging some sites to be specially mentioned are Yahoo messenger, AOL instant messenger, Windows live messenger etc. In gaming the games to play online mainly War craft, Call to Arms, Counter Strike etc hides this Trojan.

A firm of computer security called F secure have discovered about 32 different types of Zlob Trojans. Some of these types are: rogue DNSFree Web Content, DNS changer etc. This process is till going on for the discovery of some more of them. The make attempts in hacking the routers for changing the settings of DNS. Hence it results in potential rerouting in trafficking of some illegal websites. These viruses also have links in downloading the instalments of anti virus exe.

Automatic shutdown and automatic restarts is one of its main symptoms. When the file called ‘zlberkfer.exe’ is attempted to run it results in this symptom.

Some sites offer videos to watch freely online. Clicking on these videos it asks to download the illegal codec of Active X. This results in difficulties to close the browser in a usual way. The java cab which offers the free scanning will also freely offer you this virus.

How to prevent the attacking of this Trojan?

1. First of all the important measure is not to log into illegal websites.
2. Be aware when you are chatting on super fast messengers.
3. Don’t download anything from websites which shows you pop ups ads.
4. Be careful when you are playing online games.
5. Please do not download illegal anti spyware software which is mentioned to be available freely.
6. Do not choose the ads which show you illegal winning offers.

How to easy remove this Trojan if attacked?

It also involves the same steps involved in other Trojans. These Trojan only attacks the computers but fails in attacking its own files. Hence it is easy to identify these files and soon they have to be removed. Some Trojans changes the starting up system. Hence if it is ignored it will turn out to be highly dangerous. The removal tools of Malware and some antivirus software are the best option to go with for removal of these viruses.

There are some proofs that the Trojan Zlob is a tool originated in Russia.

Monday, July 20, 2009

How to Kill Trojan Horse Virus Easily?

Here's some tips on how to kill trojan virus horse easily.

Do you wish to learn how to kill Trojan horse virus easily on your computer? These harmful programs are able to hide themselves from detection by typical anti virus software on a PC by changing themselves into a state that security programs are unable to detect.

They can hide inside spyware and adware programs and enter your system together with any files that are infected by them. Trojans has always been one of the most difficult and tedious problems to deal with in today's PC security industry. General malware and virus removal software will have a hard time dealing with Trojan viruses because of their more advanced capabilities.

1. What Are Some of the Common Symptoms of a Trojan Horse Attack?

A Trojan that has attacked a computer system can cause it to show some symptoms. For example, the user may find some of the selection options in the Start Menu missing, standard keyboard shortcuts like Ctrl + Alt + Delete to be not working, the computer may crash often or even restart by itself, processing and Internet explorer speed slow down significantly, weird pop up advertisements and unauthorized redirecting of the user to other websites, files opening by themselves randomly, changing of desktop wallpaper and web browser homepage, plus many more. All these effects are very irritating and can be potentially harmful for the user.

2. How to Kill Trojan Horse Virus Easily?

You can choose to find these malicious software manually to delete them, but I would personally not recommend it as it is both dangerous and time consuming. The best and fastest method today is to download the best updated anti-spyware and anti-virus protection software to help you get the job done.

3. What Can a PC Antivirus and AntiSpyware Program Do?

This type of PC security software can perform a thorough scan into your entire system and find 99.9% of all known errors. It will then generate a final report that tells the user what the bad files it has found are. Once the software has done this, you can then first choose to repair the file. If the file cannot be repaired, you will then have to decide if the file is too important to be deleted.

This is the reason why attempting to find erroneous files manually to delete is very dangerous especially for less technical PC users. They may end up deleting wrong files like the command executable file that will end causing the whole system to be unable to start up. A good protection can also give you proper advice on how to solve such problems.

Saturday, July 18, 2009

Removing A Trojan Virus

Here are the tips on Removing A Trojan Virus.

What would be if we could remove this trojan virus from your computer within minutes and a few simple steps? How could it help to know that you are protected against further attempts by spyware or viruses from infecting your computer? Well both can be done fairly easily if you are willing to follow the advice below.

First, you need to know exactly what the virus is a Trojan horse and how it can be harmful not only for the computer, but your finances.

Although most people believe that the virus is a Trojan horse that is it a virus - that the reality is actually a Trojan horse is a type of spyware that is written in order to retrieve vital information from your computer, such as passwords, even if the credit card and bank account.

And it does so with the two primary methods - the first record from your keyboard, surfing habits, and other models of behavior and send this information to a remote server, or in the worst cases, the Trojan can give full access to a and allow remote attacker can take complete control of your computer.

This is why the viruses and spyware so protection is critical in an age of Internet, because most people think that having the infection is nothing more than a nuisance, the reality is that it is very more dangerous than that.

How do I delete a Trojan Virus Off My Computer?

Like a Trojan horse is smart, stealthy and can hide deep within the file system on your computer and / or to register, manual removal is almost impossible. Many people are led to believe that you can simply delete some files and eliminate the infection from a Trojan horse, but this is not the case. Often, there are literally dozens of files or more than a Trojan horse virus writing to the computer.

The best way to completely remove the virus Trojan horse on your computer is to download and install a high removal tool spyware. This is the only way to find and delete all files and entries with a Trojan infection - but there is another important point to consider installing a Spyware Remover and the majority of people, and is this:

Using a spyware removal that includes real-time protection, and most of the best do, make sure that your computer will be protected against further attempts by Trojan horses and other spyware d 'infect your computer, first because they are blocked at the point of origin by the software to remove spyware.

Here's the bottom line - if it is infected by one, the best way to not remove a trojan virus on your computer, but also to protect your computer and your personal information against hackers is to download and install a tool high-end for the removal of spyware that includes a real-time protection - will be glad you did.

Do not ruin your computer or the risk of personal financial information compromised - remove this Trojan virus before it is too late.

How Trojan Programs Harm Your Computer

What I know on how trojan programs harm your computer.

A Trojan horse is an executable file, which usually conceals a useful program that is relevant to the user. The reality is an "evil" that arrive in your inbox an e-mail disguised as a cool game or a screen saver.

The Trojan may also, as some other interesting applications. The difficult and dangerous part is that these often harmful attachments seem to be from a friend, when in reality, it is by the enemy, which has infected your friend and that unconsciously harm the program for you.

If you downloaded and run (RUN), this type of program can be very dangerous for your computer. To ensure that you are not infected by a Trojan, a good rule of thumb is to not download files from strangers and even leery of opening attachments from people you know. Before opening any system, it is good practice to check with the sender, whether intentionally sent to you before you download a file and run it.

Once the trojan has been installed and executed, the file is enabled and may lead to chaos in a program running on your computer. The Trojans are in contrast with viruses, because viruses are a sort of code of self-replicating, which leads to a host file and can not operate without the host as a managed, while the Trojan horse that can provide themselves. The reason is that the trojan is a program in itself is not malicious code into another program, such as viruses.

The Trojan horse, like the ancient Greek army during the Trojan War, with tricks and masquerades as a useful program to access your computer. It is appropriate, because it belongs next to every other computer program applications. The Trojan does not replicate itself, but with just one click of the mouse may be sufficient to damage if not reply to damage. The exploiters Trojans may have the number and control the computer.

If your system is infected with a trojan, the computer is often wrong. Trojan can cause massive damage to your computer system and personal transactions. With the activation of destructive programs, Trojan horse, the computer is open to many types of vulnerabilities and exploits. Data can be erased, personal information and passwords may be compromised, destroyed the files, or an unauthorized user may have full access to the system and perhaps even control.

Preventive measures will help ensure that your computer is free from Troy. This is a wise idea to educate yourself and learn to not as a "stunt" with the warmth of Troy, which is the strongest form of protection. They protect themselves by updating the operating system with the latest versions and patches, install antivirus and firewall software and make sure it is updated regularly. In addition to install a good spyware is a program of preventive measure to protect your computer.

Trojan programs can really do damage to your computer and your personal life, when the personal computer business. Nothing is ever 100%, but with the knowledge and proactive, you can significantly reduce the chances of the infected computer.

Trojan Roots

Here's my thought about Trojan Roots.

Last year my computer was one of the first order by a new Trojan horse virus. We visited the website or something wrong with the Trojan virus embedded in them. We almost lost our computers and everything in it. Thank God our computer back every night. The Trojan virus was so new that our anti-virus security do not know how to control them. We have been in contact with people who produce our anti-virus and security software that deals with the daily updates. We gave them access and control over our computer. They managed to block the virus, stop the computer from which any further.

They immediately send an update that is limited to stop this virus from infecting other computers with their virus protection. They let us know that our computer may be infected for a while ', but was contained and would not be able to do more damage. Once you find a way to kill the virus, it sends an update and that would clean our system.

The Trojans struck us was designed to damage our computers. It 'been programmed to destroy data. There are other types of trojan. Some are programmed so that one third of remote access to your computer. This is a remote administration trojan. This may be to see your data, or just to fight with him. It is often used to steal passwords for the victim or the registry. In addition to upload, download, run files, and more. Scary thought is that actually turn a web cam and see what to do, every time.

A Downloader / Dropper is that meaning and purpose is to download another program on your computer.

The remote administration usually a Trojan horse program is to download to your computer. A server of Trojan creates a file server on the victim's computer. This allows the hacker to upload or download files. A Trojan server is often used to load a remote administration trojan, take control of your computer to hackers. Another type of Trojans used to do this, which is a security software to disable it. You can use the hackers in the past, your security, usually with the intention of creating a program for remote administration.

This is a unique type of trojan around. The aim is not to destroy data or control on your computer to secure your data. No, it is gaining control of your computer, and many others, so that at a certain time when all add third computer. This was done to yahoo.com is that not long ago.
Bookmark and Share

Sponsor Links

How To Make Money Removing Viruses And Spyware - Using Totally Free Software.
How Would You Like To Learn The Simple Methods
You can use this information to start a high-paying business.
www.extragoodlife.com

You Will Make Money. We Guarantee It!
uge demand with almost no competition! Start part time with little or no out of pocket expense!
Ready to join the upper class? Buy a nice house and have all the fun toys? Are you willing to work for it?
www.pappapc.com

Computer Secrets Unleashed 2009!
JUST RELEASED - ALL NEW & EXPANDED 2009 VERSION!!
Top Information Technology Consultant spills the beans and reveals his secret techniques...
www.computer-secrets-unleashed.com