Which Destroyed Your Computer
COMPUTER VIRUSES Markus Hanhisalo Department of Computer Science Helsinki University of Technology Markus.Hanhisalo@hut.fi This report briefly introduces computer viruses and how they effect network security. I have introduced today's virus situation. Many people are afraid of viruses, mostly because they do not know much about them. This report will guide you in the event of a virus infection.Computer viruses and network security is important. There are things that are not public information. Therefore it is good to be a weare of possible network security problems.
Table of Contents
2.2 Macro viruses
2.3 Virus sources
2.4 How viruses act
2.5 Viruses in different platforms
2.2 Macro viruses
2.3 Virus sources
2.4 How viruses act
2.5 Viruses in different platforms
- 5.1 A questionnaire survey in Finland about viruses 5.2 It is going to be a criminal act to make viruses in Finland
I took it form [http://www.tml.tkk.fi/Opinnot/Tik-110.501/1997/viruses.html]
Articles in the VIRUS CREATION Category
How to Test the Working of your Antivirus – EICAR Test
Have you ever wondered how to test your Antivirus software to ensure it’s proper working? Well here is a quick and easy way to test your antivirus. The process is called EICAR test which will …
A Virus Program to Disable USB Ports
In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with …
How to Make a Trojan Horse
Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple …
A Virus Program to Block Websites
Most of us are familiar with the virus that used to block Orkut and Youtube site. If you are curious about creating such a virus on your own, here is how it can be done. As …
A Virus Program to Restart the Computer at Every Startup
Today I will show you how to create a virus that restarts the computer upon every startup. That is, upon infection, the computer will get restarted every time the system is booted. This means that …
How to Create a Computer Virus?
This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it …
NOTE: Most antivirus will pop-out a warning message in the Step-1 itself
Know About -
12 Tips to Maintain a Virus Free Computer
How to Alter Windows Product ID
How to Recover Deleted Files from Windows and Mac
How to Test the Working of your Antivirus – EICAR Test
Submitted by Srikanth
Have you ever wondered how to test your Antivirus software to ensure it’s proper working? Well here is a quick and easy way to test your antivirus. The process is called EICAR test which will work on any antivirus and was developed by European Institute of Computer Antivirus Research. This process can be used by people, companies and antivirus programmers to test the proper functioning of the antivirus/antimalware software without having to deal with the real computer virus which can cause damage to the computer. Here is a step-by-step procedure to test your antivirus.
1. Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad.
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
2. Rename the file from New Text Document.TXT to myfile.com
3. Now run the antivirus scan on this myfile.com file.
If the antivirus is functioning properly on your computer, then it should generate a warning and immediately delete the file upon scanning. Otherwise you may have to re-install your antivirus.
NOTE: Most antivirus will pop-out a warning message in the Step-1 itself
You can also place the myfile.com file in a ZIP or RAR file and run a scan on it so as to ensure whether your antivirus can detect the test string in the compressed archive. Any antivirus when scanning this file will respond exactly as it will do for a genuine virus/malicious code. This test will cause no damage to your computer even though the antivirus will flag it as a malicious script. Hence it is the safest method to test the proper functioning of any antivirus.
Know About -
- BROADBAND HACKS
- C SOURCE CODES
- CELL PHONE HACKS
- COMMAND PROMPT HACKING
- DATA RECOVERY
- EMAIL HACKING
- EMAIL SECURITY
- ENCRYPTION
- GOOGLE HACKS
- HACKING AND SECURITY NEWS
- HOW-TO GUIDES
- INTERNET SECURITY
- IP ADDRESS
- LATEST E-GADGETS
- LEARN HACKING – FOR BEGINNERS
- MYSPACE HACKS
- NETWORK HACKS
- ORKUT HACKS
- PARENTAL CONTROL SOFTWARES
- PASSWORD HACKING
- PC SECURITY
- PRODUCT REVIEWS
- REGISTRY HACKS
- SPEED UP COMPUTER
- VIRUS CREATION
- WEBSITE HACKING
- WINDOWS 7 HACKS
- WINDOWS VISTA HACKS
- WINDOWS XP HACKS
- YAHOO MESSENGER HACKS
Collect form http://www.gohacking.com/2010/04/how-to-test-the-working-of-your-antivirus-eicar-test.html
A Virus Program to Disable USB Ports12 Tips to Maintain a Virus Free Computer
How to Alter Windows Product ID
How to Recover Deleted Files from Windows and Mac
Free Computer Help
Microsoft Security
You can view many virus image here
click on the image
Detect virus & get anti-virus
click on the image
How can I protect my pen-drive from virus
click on the image
You can view many virus image here
click on the image
Detect virus & get anti-virus
click on the image
How can I protect my pen-drive from virus
click on the image
HACKIING
Hackers---
What is CAPTCHA and How it Works?
Submitted by Srikanth on Friday, 4 June 2010
CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response test to ensure that the response is only generated by humans and not by a computer. In simple words, CAPTCHA is the word verification test that you will come across the end of a sign-up form while signing up for Gmail or Yahoo account. The following image shows the typical samples of CAPTCHA.
Almost every Internet user will have an experience of CAPTCHA in their daily Internet usage, but only a few are aware of what it is and why they are used. So in this post you will find a detailed information on how CAPTCHA works and why they are used.
What Purpose does CAPTCHA Exactly Serve?
CAPTCPA is mainly used to prevent automated software (bots) from performing actions on behalf of actual humans. For example while signing up for a new email account, you will come across a CAPTCHA at the end of the sign-up form so as to ensure that the form is filled out only by a legitimate human and not by any of the automated software or a computer bot. The main goal of CAPTCHA is to put forth a test which is simple and straight forward for any human to answer but for a computer, it is almost impossible to solve.
What is the Need to Create a Test that Can Tell Computers and Humans Apart?
For many the CAPTCHA may seem to be silly and annoying, but in fact it has the ability to protect systems from malicious attacks where people try to game the system. Attackers can make use of automated softwares to generate a huge quantity of requests thereby causing a high load on the target server which would degrade the quality of service of a given system, whether due to abuse or resource expenditure. This can affect millions of legitimate users and their requests. CAPTCHAs can be deployed to protect systems that are vulnerable to email spam, such as the services from Gmail, Yahoo and Hotmail.
Who Uses CAPTCHA?
CAPTCHAs are mainly used by websites that offer services like online polls and registration forms. For example, Web-based email services like Gmail, Yahoo and Hotmail offer free email accounts for their users. However upon each sign-up process, CAPTCHAs are used to prevent spammers from using a bot to generate hundreds of spam mail accounts.
Designing a CAPTCHA System
CAPTCHAs are designed on the fact that computers lack the ability that human beings have when it comes to processing visual data. It is more easily possible for humans to look at an image and pick out the patterns than a computer. This is because computers lack the real intelligence that humans have by default. CAPTCHAs are implemented by presenting users with an image which contains distorted or randomly stretched characters which only humans should be able to identify. Sometimes characters are striked out or presented with a noisy background to make it even more harder for computers to figure out the patterns.
Most, but not all, CAPTCHAs rely on a visual test. Some Websites implement a totally different CAPTCHA system to tell humans and computers apart. For example, a user is presented with 4 images in which 3 contains picture of animals and one contain a flower. The user is asked to select only those images which contain animals in them. This Turing test can easily be solved by any human, but almost impossible for a computer.
Breaking the CAPTCHA
The challenge in breaking the CAPTCHA lies in real hard task of teaching a computer how to process information in a way similar to how humans think. Algorithms with artificial intelligence (AI) will have to be designed in order to make the computer think like humans when it comes to recognizing the patterns in images. However there is no universal algorithm that could pass through and break any CAPTCHA system and hence each CAPTCHA algorithm must have to be tackled individually. It might not work 100 percent of the time, but it can work often enough to be worthwhile to spammers.
Konw about your Gmail
Internet Security and Ethical Hacking |
Cracking GMail Account Password
Network Hacking
Password Hacking
E-Mail Hacking
Wireless Hacking
Input Validation
DoS Attacks
Privacy Attacks
IP Spoofing
Cryptography
IDS/IPS
Viruses
Exploits/Bugs
Hack Tips/Tricks
Hacking Tools
E-Books
Videos
WhitePapers