Pages

Monday, 30 September 2013

What Is The Difference Between a Computer Virus, Worm and Trojan Horse?

5 comments

Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three.


One common mistake that people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same thing. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you better protect your computer from their often damaging effects.


What Is a Virus?
A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email.
 

Internet Security Threat Report: 2013 Download Now

What Is a Worm?
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.


What Is a Trojan horse?
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.  When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.


What Are Blended Threats?
Added into the mix, we also have what is called a blended threat. A blended threat is a more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagates using multiple methods, the attack can come from multiple points, and blended threats also exploit vulnerabilities.
To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it would also, for example, install a backdoor and maybe even damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. So, while a worm may travel and spread through e-mail, a single blended threat could use multiple routes including e-mail, IRC and file-sharing sharing networks.
Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do multiple malicious acts, like modify your .exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.
Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats also require no human intervention to propagate.


Tips to Combat Viruses, Worms and Trojan Horses on Your Computer:

 
1. Keep The Operating System Updated:
The first step in protecting your computer from any malicious there is to ensure that your operating system (OS) is up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you need to have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses. Additionally, you want to make sure your anti-virus program has the capability to scan e-mail and files as they are downloaded from the Internet, and you also need to run full disk scans periodically. This will help prevent malicious programs from even reaching your computer.


2. Use a Firewall:
You should also install a firewall. A firewall is a system that prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in out going e-mails and see this as regular network traffic.
For individual home users, the most popular firewall choice is a software firewall.  A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network.
It is important to remember that on its own a firewall is not going to rid you of your computer virus problems, but when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will add some extra security and protection for your computer or network. 


Did You Know... CodeRed, a blended threat, launched DoS attacks, defaced Web servers, and its variant, CodeRed II, left Trojan horses behind for later execution. CodeRed was processed in memory — not on a hard disk — allowing it to slip past some anti-virus products. Computer Economics has estimated the worldwide cost of CodeRed at $2.62 billion dollars. [Source: Symantec Web site]

Key Terms To Understanding Computer Viruses:

 
Virus: A program or piece of code that is loaded onto your computer without

   your knowledge and runs against your wishes.

Worm: A program or algorithm that replicates itself over a computer network
   and usually performs malicious actions

Trojan Horse: A destructive program that masquerades as a benign
   application. Unlike viruses, Trojan horses do not replicate themselves.

Blended Threat: Blended threats combine the characteristics of viruses,

   worms, Trojan Horses, and malicious code with server and Internet
   vulnerabilities .

Antivirus Program: A utility that searches a hard disk for viruses and

  removes any that are found.

Saturday, 28 September 2013

How to Use Your Full Internet Bandwidth Speed?

2 comments
We have already discussed "How to Increase Your Browser internet Speed" and "How to make your computer fresh and fast" ,in this article we will see "How to Use Your Full Internet Bandwidth Speed?"
By Default, Microsoft Windows reserves 20% of bandwidth for it’s own use like Updates etc. This should be undone immediately to optimize or increase your internet speed. To do so you don’t need to install any extra program; you can do this with a simple setting given below step by step.
1. Press "Windows key + R" (shortcut key for RUN).
2. Now type gpedit.msc in Run Box and hit Enter. This will give access to Group
    Policy Editor.
     


3. Then Navigate to Computer Configuration -> Administrative Templates -> Network -> QOS Packet Scheduler using the pane on the left side.




4. Now in the right panel you will notice an option called 

   "Limit Reservable Bandwidth". Double click on it or Right click on it and
    choose "Edit" option.

5. A new window will pop out where you will find Bandwidth Limit is not
   configured by default. 

6. Now click enabled then you will find Bandwidth Limit is set to 80% by
    default (in Windows 8), so now change Bandwidth Limit to 0 then apply the
    changes.



7. Hit OK and close the group policy editor. And Restart Your PC.

Friday, 27 September 2013

How to Hide a Particular or Specific Drive by Using Command Prompt?

0 comments
In my last post I show you that how to hide all the drives together by using registry editing. Now, I will show you that how to hide a Particular or specified drive by using Command Prompt. Now hide any Hard Drive partition without any software. Just follow the simple steps below to hide your particular or specified drive.

This is the best security tip to be employed against unauthorized users.
1. Go to Start >> Run >> type "diskpart" (without quotes). A DOS  window will

    appear like this one.


2. Then type "list volume" (without quotes). The result will look something like
    this one as shown in the picture:
         


3. Suppose you want to hide drive D then type "select volume 3" (without quotes). Then a message will appear in same window {Volume 3 is the selected volume}
    


4. Now type "remove letter D" (without quotes). Now a message will come
{DiskPart successfully removed the drive letter or mount point}
    


5. All done. Sometime it requires rebooting or just sing out the computer.

Your Data is now safe from unauthorized users. To access the content of hidden Drive repeat the process mentioned above. But in 4th step replace "remove" by "assign". It means type "assign letter D" in 4th step to unhide drive D.                     


Enjoy..!

Thursday, 26 September 2013

How to Hide all The Drives (C:\, D:\, E:\, ... etc) in Your Computer?

1 comments
This is a great trick, you can play on your friends and also will make your privacy high. how to disable the display of Local or networked drives when you click My Computer, see step by step here :-

1. Go to start->run. Type regedit.

2. Now go to:

    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion

    \Policies\Explorer

3. Now in the right pane, right click anywhere then click on New then

    Create a new DWORD item and name it NoDrives (it is case sensitive).

    Now modify it's value by right click and set it to 3FFFFFF (Hexadecimal).

4. Now restart or just sing out your computer. So, now when you click on My
    Computer, no drives will be shown (all Done).

5. To enable display of drives in My Computer, simply delete this DWORD item
    that you created.
6. Again restart or just sing out your computer. You can now see all the drives
    again. Magic........lol.... ;)

Wednesday, 25 September 2013

Top 10 Free Best SMS Sites to Send SMS Online to Cell Phones

2 comments
Now a days sending SMS daily is became one of our daily routine.Am I Right? The answer is yes for Sure and especially youth is enjoying Chatting with friends daily! But its very expensive to send message in India or in other countries.So today we have listed 10 Top sites to send free message online it includes sending message within India and other part of the world also.
                       


1. 160by2

This is a very popular site through which you can send free message to any mobile number/network in India.This is popular because of its fast delivery service and easy to use interface.Therefor more than 12 million users use this free messaging service.They Provide 160 Character Limit for Standard SMS and 140 character for Personal SMS. 160by2 is good service for sending SMS withing India.


SlideSMS provide you to send unlimited International SMS for Free.You can send messages to more than 200 countries in this world.You can Send message upto 300 Characters limit as well as it offers you to send Picture message also for free only.It delivers the message instantly in all over world.

Way2SMS is famous because of message delivering time which less than 10 seconds.Easy Sending, Contact Management these are some oher features offered by Way2SMS.Not only this you can get free E-mail alerts to mobile inbox and also can Chat with your Gtalk and yahoo friends using Way2SMS simultionsely.But it has restriction that you can send message only within India.

From SMScity you can send Free International SMS daily.Not only SMS you can also send free Picture message also.Using SMScity you can send free sms to 22 different countries.You can also send SMS via your MSN messenger and SMScity delivery is Reliable.

5. SMS440

This site is different from all other site because of this features listed below:-
  •     It allows you to send long character message upto 440 characters.
  •     You can send SMS in many Other language other than Hindi and English.
  •     You can also schedule SMS for any day and time for future.
  •     Allows you to create Phone Book
  •     And can also send Group messages.

Text me Free Allows you to send Free SMS message to mostly every country in the world.TextmeFree Doesn't require registration to send messages.

This is site got very popular with in some time only because of its some advance feature which allows you to schedule message to be sent in all over india.you have to just type the message, set the desired date and time and you are done. SMS will be sent automatically !!

This Website allows you to send message to any mobile number within India whether it is CDMA or GSM.Also, it contain SMS collection on different topics and events based messages and can send to any one in all over India.And the best part this site has a list of latest Online music songs which you can live stream while sending messages.

Text4FreeOnline allows you to send longest messages in all over world upto 700 characters and you can send unlimited messages.Along with text and picture message it provide you to share music from your computer.

You can send free messages in all over India.Mysmsindia is currently used by various departments like Financial institution, education institutes and many other.You can send Unlimited SMS for free and there is No advertisement in SMS and no Character Limit.

Monday, 23 September 2013

VLC Media Player Fun Trick

2 comments
In this tutorial i will share a simple trick yet interesting trick i came across while surfing on the internet. I will call it VLC Inception trick. This trick is simple and works on windows xp, 7 as well as windows 8. If you know this trick then it’s great if you don't then lets dive into it.

How To Do This Trick?

101 Most Useful Websites But Lesser Known on Internet

0 comments
Hey guys,today we will see 101 such websites which is very useful but are lesser known on web, so today i will provide 101 most useful websites with short description, let see.
1. screenr.com – record movies of your desktop and send them straight to YouTube.
2. bounceapp.com – for capturing full length screenshots of web pages.
3.    goo.gl – shorten long URLs and convert URLs into QR codes.
4. untiny.me – find the original URLs that’s hiding behind a short URLs.
5.    localti.me – know more than just the local time of a city
6. copypastecharacter.com – copy-paste special characters that aren’t on your keyboard.
7.     topsy.com – a better search engine for twitter.
8.     fb.me/AppStore – search iOS apps without launching iTunes.
9.     iconfinder.com – the best place to find icons of all sizes.
10.office.com – download templates,clipart and images for your Office documents.
11. woorank.com – everything you wanted to know about a website.
12. virustotal.com – scan any suspicious file or email attachment for viruses.
13. wolframalpha.com – gets answers directly without searching.
14. printwhatyoulike.com – print web pages without the clutter.
15. joliprint.com – reformats news articles and blog content as a newspaper.
16. isnsfw.com – when you wish to share a NSFW page but with a warning.
17. e.ggtimer.com – a simple online timer for your daily needs.
18. coralcdn.org – if a site is down due to heavy traffic, try accessing it through coralCDN.
19. random.org – pick random numbers, flip coins, and more.
20. mywot.com – check the trust level of any website – example.
21. viewer.zoho.com – Preview PDFs and Presentations directly in the browser.
22. tubemogul.com – simultaneously upload videos to YouTube and other video sites.
23. truveo.com – the best place for searching web videos.
24. scr.im – share you email address online without worrying about spam.
25. spypig.com – now get read receipts for your email.
26. sizeasy.com – visualize and compare the size of any product.
27. whatfontis.com – quickly determine the font name from an image.
28. fontsquirrel.com – a good collection of fonts – free for personal and commercial use.
29. regex.info – find data hidden in your photographs – see more EXIF tools.
30. tineye.com – this is like an online version of Google Googles.
31. iwantmyname.com – helps you search domains across all TLDs.
32. tabbloid.com – your favorite blogs delivered as PDFs.
33. join.me – share you screen with anyone over the web.
34. onlineocr.net – recognize text from scanned PDFs and images – see other OCR tools.
35. flightstats.com – Track flight status at airports worldwide.
36. wetransfer.com – for sharing really big files online.
37. pastebin.com – a temporary online clipboard for your text and code snippets.
38. polishmywriting.com – check your writing for spelling or grammatical errors.
39. awesomehighlighter.com – easily highlight the important parts of a web page.
40. typewith.me – work on the same document with multiple people.
41. whichdateworks.com – planning an event? find a date that works for all.
42. everytimezone.com – a less confusing view of the world time zones.
43. warrick.cs.odu.edu – you’ll need this when your bookmarked web pages are deleted.
44. gtmetrix.com – the perfect tool for measuring your site performance online.
45. imo.im – chat with your buddies on Skype, Facebook, Google Talk, etc. from one place.
46. translate.google.com – translate web pages, PDFs and Office documents.
47. youtube.com/leanback – sit back and enjoy YouTube videos in full-screen mode.
48. similarsites.com – discover new sites that are similar to what you like already.
49. wordle.net – quick summarize long pieces of text with tag clouds.
50. bubbl.us – create mind-maps, brainstorm ideas in the browser.
51. kuler.adobe.com – get color ideas, also extract colors from photographs.
52. followupthen.com – setup quick reminders via email itself.
53. lmgtfy.com – when your friends are too lazy to use Google on their own.
54. tempalias.com – generate temporary email aliases, better than disposable email.
55. pdfescape.com – lets you can quickly edit PDFs in the browser itself.
56. faxzero.com – send an online fax for free – see more fax services.
57. feedmyinbox.com – get RSS feeds as an email newsletter.
58. isendr.com – transfer files without uploading to a server.
59. tinychat.com – setup a private chat room in micro-seconds.
60. privnote.com – create text notes that will self-destruct after being read.
61. flightaware.com – live flight tracking service for airports worldwide.
62. boxoh.com – track the status of any shipment on Google Maps – alternative.
63. chipin.com – when you need to raise funds online for an event or a cause.
64. downforeveryoneorjustme.com – is your favourite site really offline?
65. example.com – this website can be used as an example in documentation.
66. whoishostingthis.com – find the web host of any website.
67. google.com/history – found something on Google but can’t remember it now?
68. errorlevelanalysis.com – find whether a photo is real or a photoshopped one.
69. google.com/dictionary – get word meanings, pronunciations and usage examples.
70. urbandictionary.com – find definitions of slangs and informal words.
71. seatguru.com – consult this site before choosing a seat for your next flight.
72. sxc.hu – download stock images absolutely free.
73. imo.im – chat with your buddies on Skype, Facebook, Google Talk, etc. from one place.
74. wobzip.org – unzip your compressed files online.
75. vocaroo.com – record your voice with a click.
76. scribblemaps.com – create custom Google Maps easily.
77. buzzfeed.com – never miss another Internet meme or viral video.
78. alertful.com – quickly setup email reminders for important events.
79. encrypted.google.com – prevent your ISP and boss from reading your search queries.
80. formspring.me – you can ask or answer personal questions here.
81. snopes.com – find if that email offer you received is real or just another scam.
82. typingweb.com – master touch-typing with these practice sessions.
83. mailvu.com – send video emails to anyone using your web cam.
84. ge.tt – quickly send a file to someone, they can even preview it before downloading.
85. timerime.com – create timelines with audio, video and images.
86. stupeflix.com – make a movie out of your images, audio and video clips.
87. aviary.com/myna – an online audio editor that lets you record and remix audio clip.
88. noteflight.com – print music sheets, write your own music online (review).
89. disposablewebpage.com – create a temporary web page that self-destruct.
90. namemytune.com – when you need to find the name of a song.
91. homestyler.com – design from scratch or re-model your home in 3d.
92. snapask.com – use email on your phone to find sports scores, read Wikipedia, etc.
93. teuxdeux.com – a beautiful to-do app that resembles a paper dairy.
94. livestream.com – broadcast events live over the web, including your desktop screen.
95. bing.com/images – automatically find perfectly-sized wallpapers for mobiles.
96. historio.us – preserve complete web pages with all the formatting.
97. dabbleboard.com – your virtual whiteboard.
98. whisperbot.com – send an email without using your own account.
99. sumopaint.com – an excellent layer-based online image editor.
100.lovelycharts.com – create flowcharts, network diagrams, sitemaps, etc.
101. nutshellmail.com – Get your Facebook and Twitter streams in your inbox.
uff.... we just saw 101 very usefull websites. I know now you are aware of all these and will help you now or after. enjoy. if you like it don't forget to Join us on Facebook :)


 
© 2013 Hacker'S Den | Designed by Making Different | Provided by Hacker'S Den | Powered by Hacker'S Den