[Show all top banners]

nishant
Replies to this thread:

More by nishant
What people are reading
Subscribers
:: Subscribe
Back to: Kurakani General Refresh page to view new replies
 All about viruses.
[VIEWED 3299 TIMES]
SAVE! for ease of future access.
Posted on 12-16-06 7:27 PM     Reply [Subscribe]
Login in to Rate this Post:     0       ?    
 

What are viruses.
Viruses are "programs" that modify other programs on a computer, inserting copies of themselves. Viruses are not distinct programs - they cannot run on their own, and need to have some host program, of which they are a part, executed to activate them.


Varieties of viruses:

Stealth Virus: A stealth virus has code in it that seeks to conceal itself from discovery or defends itself against attempts to analyze or remove it. The stealth virus adds itself to a file or boot sector but, when you examine, it appears normal and unchanged. The stealth virus performs this trickery by staying in memory after it is executed. From there, it monitors and intercepts your system calls. When the system seeks to open an infected file, the stealth virus displays the uninfected version, thus hiding itself.

Macro viruses: Macro languages are (often) equal in power to ordinary programming languages such as C. A program written in a macro language is interpreted by the application. Macro languages are conceptually no different from so-called scripting languages. Gnu Emacs uses Lisp, most Microsoft applications use Visual Basic Script as macro languages. The typical use of a macro in applications, such as MS Word, is to extend the features of the application. Some of these macros, known as auto-execute macros, are executed in response to some event, such as opening a file, closing a file, starting an application, and even pressing a certain key. A macro virus is a piece of self-replicating code inserted into an auto-execute macro. Once a macro is running, it copies itself to other documents, delete files, etc. Another type of hazardous macro is one named for an existing command of the application. For example, if a macro named FileSave exists in the "normal.dot" template of MS Word, that macro is executed whenever you choose the Save command on the File menu. Unfortunately, there is often no way to disable such features.

Linux/Unix: The most famous of the security incidents in the last decade was the Internet Worm incident which began from a Unix system. But Unix systems were considered virus-immune -- not so. Several Linux viruses have been discovered. The Staog virus first appeared in 1996 and was written in assembly language by the VLAD virus writing group, the same group responsible for creating the first Windows 95 virus called Boza.

Like the Boza virus, the Staog virus is a proof-of-concept virus to demonstrate the potential of Linux virus writing without actually causing any real damage. Still, with the Staog assembly language source code floating around the Internet, other virus writers are likely to study and modify the code to create new strains of Linux viruses in the future.

The second known Linux virus is called the Bliss virus. Unlike the Staog virus, the Bliss virus can not only spread in the wild, but also possesses a potentially dangerous payload that could wipe out data.

While neither virus is a serious threat to Linux systems, Linux and other Unix systems will not remain virus-free. Fortunately, Linux virus writing is more difficult than macro virus writing for Windows, so the greatest virus threat still remains with Windows.

Signs of virus infection.

* You get confirmations for e-mails you did not send.
* Your system seems unusually slow or certain programs will not run.
* You have hardware problems such as stuck keys that repeat the same character over and over, keyboard locking in CAPS mode, black rectangles appearing on the screen at random, system lock-ups, etc.
* You have software problems such as program lockups for no reason, menu items react strangely, mode indicators like "CAPS LOCK" stop working, etc.
* Error messages like "Incompatible file error" or "Not enough memory," appear for no apparent reason.
* You get unusual messages on your monitor, such as “Hacked by Chinese”.

Actions if you are infected.

* Turn off your computer. DO NOT click Start>Shut Down>Shut Down the Computer. That takes too long. Simply push the power button and hold it until the computer shuts off. This will prevent continued spread of the virus.
* Inform your IT department immediately and let them handle the problem. Do not panic or interrupt other users.
* What if your company does not have its own IT department? What if you are infected with a virus on your home PC? What should you do?
* The first thing to do when you realize you are infected is to disconnect your computer from your Internet connection. This will limit the spread of the virus. If you have an “always on” connection, such as a network, cable modem, or DSL, physically unplug the connection from your PC.
* If your virus definitions are up to date and you simply neglected to scan an attachment, scan it now to determine which virus has infected your computer.
* If you need to update your definitions in order to scan for the virus, try to download the definitions using another computer and transfer them to your PC using diskettes or a CD.
* Once you have determined the name of the virus, find the removal instructions on the website of your anti-virus software (again, using another computer), and follow them step-by-step. It is very important to follow the instruction precisely. If you skip a step, you can exacerbate the problem. Be very careful when making changes to the registry and other system files. You can inadvertently do more damage than the virus if you delete the wrong file.

src- idk somewhere in cyb3r.
 
Posted on 12-16-06 7:49 PM     Reply [Subscribe]
Login in to Rate this Post:     0       ?    
 

and the point of this is.............................
peace
 
Posted on 12-17-06 8:10 AM     Reply [Subscribe]
Login in to Rate this Post:     0       ?    
 

is FLU a virus too ? or is the write-up so lame ? :P
 


Please Log in! to be able to reply! If you don't have a login, please register here.

YOU CAN ALSO



IN ORDER TO POST!




Within last 90 days
Recommended Popular Threads Controvertial Threads
TPS Re-registration case still pending ..
Toilet paper or water?
ढ्याउ गर्दा दसैँको खसी गनाउच
Sajha Poll: Who is your favorite Nepali actress?
Problems of Nepalese students in US
Mamta kafle bhatt is still missing
Tourist Visa - Seeking Suggestions and Guidance
To Sajha admin
From Trump “I will revoke TPS, and deport them back to their country.”
Are Nepalese cheapstakes?
अरुणिमाले दोस्रो पोई भेट्टाइछिन्
wanna be ruled by stupid or an Idiot ?
MAGA denaturalization proposal!!
Nepali Psycho
advanced parole
I hope all the fake Nepali refugee get deported
How to Retrieve a Copy of Domestic Violence Complaint???
and it begins - on Day 1 Trump will begin operations to deport millions of undocumented immigrants
seriously, when applying for tech jobs in TPS, what you guys say when they ask if you have green card?
Travel Document for TPS (approved)
NOTE: The opinions here represent the opinions of the individual posters, and not of Sajha.com. It is not possible for sajha.com to monitor all the postings, since sajha.com merely seeks to provide a cyber location for discussing ideas and concerns related to Nepal and the Nepalis. Please send an email to admin@sajha.com using a valid email address if you want any posting to be considered for deletion. Your request will be handled on a one to one basis. Sajha.com is a service please don't abuse it. - Thanks.

Sajha.com Privacy Policy

Like us in Facebook!

↑ Back to Top
free counters