Wednesday, April 10, 2013

DIFFERENT TYPES OF VIRUSES





Computer viruses are computer software that is harmful to computers; it enters a computer without the permission of the owner and without its knowledge. Most of these viruses have the ability to replicate themselves and spread, but some other viruses can cause more serious damages to computers.  They can affect the programs and performance systems.  Computer viruses and worms are similar to human viruses, because they are “alive,” they have to have a host and a weak link like any biological virus. A weak link in a human may be a weak immune system and in a computer a not updated antivirus, they replicate until they reach their target or gain control of the host.
They are several kinds of viruses that can be classified in different areas:

1-Memory Resident Virus:
These types of viruses establish in the computer memory, they infect all the computers fill when the operating system, they can corrupt files that are in the computer. They hide in the ram and they are very efficient because after eliminating the viruses they can stay in the ram and get control of the memory and it can run its own code.
            Some Examples are:
1.      Randex
2.      CMJ
3.      MEVE
4.      MrMklunky

2-Direct Action Viruses:
These viruses are usually found in the hard disk’s root directory. The main purpose is to replicate, and it takes action when the virus is executed.  They are file-infesters, because the corrupt files in the device.  You can find them in computers, pen drives or hard disks.  These types of viruses are hard to get rid of because they change their location into new files.
            Example:
                                    1.Vinenna virus

3-Overwrite viruses:
These kinds of viruses can be very harmful to computers and personal information’s because it deletes the information contained in files that it infects. The virus leaves the field useless once it infected that file. They are located in the file they infected but they are tricky to find because they do not change the size of the file, and the only way to clean the file infected is to delete the entire file, resulting in loosing the original content in that file.
            Example:
1.      WAY
2.      Trj.Reboot
3.      Trivial.88.D

4-Boot Sector Virus
            The boot sector of a hard disk is very important because information of the disk is located there and along with a program it makes possible to start the computer from the disk. The boot sector virus affects the Boot and it makes it difficult for the computer to start.

5-Macro Virus
            These types of virus were created with applications or programs that contained .doc, .xls, .pps, .md. Macro viruses infect these files and also infect templates and many documents that have macro.
Example:
1.RELAX
2.Melissa. A
3.Bablas

6-Directory Virus
            These viruses infect the directory of your computer by changing the location of a file. These viruses are very harmful because once the virus infects your computer it is impossible to locate the original file you are trying to run.
            Example:
                        Dir-2 Virus

2012s worst Viruses
Flame
The first viruses to spread medium Bluetooth, and it was detected in a Russian lab

Belgian Computer Crime Virus
Spread all over the world and charge people a fee saying that this fee was for the police and ask people for personal information.


http://www.buzzle.com/articles/different-types-of-computer-viruses.html
http://www.webroot.com/En_US/consumer/articles/computer-security-threats-computer-viruses
http://www.webopedia.com/TERM/V/virus.html

Francisco Salazar  

Tuesday, April 9, 2013

Computer Worms


Computer worms are different from viruses because they reproduce and spread differently, they are independent at the time they spread and also they reproduce independently and can invade more computers than viruses. Worms can travel in networks; by this they can reach more computers faster.

Email Worms

This type of worm is one of the most famous because it spreads through emails, infecting millions of computers.  It moves from attachment to attachment or different links.  These are the most common ways they spread:
  • MS Outlook Services
  • Direct connection to SMTP servers using their own SMTP API
  • Windows MAPI functions
Internet Worms 
This worms move through networks, they infiltrate your networks using local operating systems, they look for weak networks or vulnerable ones.  When they get to your network they gain full access of your computer and can cause some severe damage and they get the opportunity to spread to other networks easily.
Examples
-not patched
-Data packets

Francisco Salazar

http://www.howstuffworks.com/virus5.htm
http://compnetworking.about.com/cs/worldwideweb/g/bldef_worm.htm

Friday, April 5, 2013

Cyber Warfare

 

So we all have heard about the nuclear threats from North Korea, but nobody is worried about the possible cyber-attacks.  Currently North Korea does not have the technology to reach the United States with their nuclear weapons.  They do, however, have the technology to shut down South Korea’s computer networks.  Recently North Korea launched cyber-attacks that shut down banks and broadcasters of South Korea.  The United States has partnered with South Korea to try to prevent future attacks from North Korea.  Since there is the looming threat of nuclear weapons it has become more prominent on everyone’s mind.  The threat of cyber-attacks may need to be more prominent in everyone’s mind.  Since all of our information is kept on computer’s there is a possibility of information being hacked by countries that we consider our enemies.  This is why it is great that the United States is taking precautions to protect their information.  

Cyber warfare can potentially become a huge threat to the United States and other developed countries who keep their information predominately online.  Think of all the personal information and government information that is stored online.  This information could be obtained by an enemy and used for their gain.  A hacker could also just shut down our systems.  In the United States everything is now being ran by technology and if someone hacked this information and shut down the system it would put our country on an unavoidable lock down.  It is important that the government and businesses work to protect their information from being hacked by malicious enemies.  

Haley Hunt

Wednesday, April 3, 2013

Hacking the Stars!

Good day all,


   I came across an article this morning that stated that power couple BeyoncĂ© and Jay-Z was hacked!  Their bank account information was leaked onto the web by hackers.  Michelle Obama has also recently been in the news because her social security number was compromised.  These hackers are using various worms/viruses in order to get this information.  Now, tell me, If it was they could get a little private information from the First Lady, then stealing mine or your identity should be a cake walk.  The First Lady, the secret service could not protect her from this virtual attack.  This friends proves that we are becoming ever more vulnerable to viruses, malware and all the sorts.  How can we average Joes be safe when the high status individuals can not even be protected? Yes, they may be of a greater target towards hackers. Although that still does not release us from the threat of identity theft.  I suggest we follow the guidelines set by my colleague Almendina and be safe on the internet.







LONG LIVE THE WEB!


-Hector Hernandez

http://urbanislandz.com/2013/03/12/beyonce-jay-z-amond-celebrities-bank-accounts-hacked/