Wednesday, May 8, 2013

BEWARE!!!!...PROTECT YOURSELF WHILE SURFING THE INTERNET!!!!!!!

Pronounced like fishing, phishing is a term used to describe a malicious individual or group of individuals scamming users by sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information. Because these e-mails and web pages look like legitimate companies users trust them and enter their personal information.
Below is an example of what a phishing e-mail may look like.

[[[[
Dear eBay customer,

Your Account has been Suspended. We will ask for your password only once. We will charge your account once per year. However you will receive a confirmation request in about 24 hours after the make complete unsuspend process.You have 24 hours from the time you'll receive the e-mail to complete this eBay Request.
Note: Ignoring this message will cause eBay TKO delete your account forever.

To make unsuspend process please use this link:

http://fakeaddress.com/ebay

eBay will request personal data(password;and so on) in this email.
Thank you for using eBay!
http://www.ebay.com/
--------------------------------------------------------------------------------
This eBay notice was sent to you based on your eBay account preferences. If you would like to review your notification preferences for other communications, "click here". If you would like to receive this email in text only, "click here"

]]]]]]]]]]]]]]]

.
To a user who frequently uses eBay or any online service, these e-mails may appear as if they have come from the company described in the e-mail. However, phishing e-mails are designed to deceive the user and trick them into visiting the links in the e-mail that are designed to steal personal information such as usernames, passwords, credit card information, etc. Below are some helpful tips on identifying these e-mails and how to handle them.
How to identify a phishing e-mail.
  1. Company - These e-mails are sent out to thousands of different e-mail addresses and often the person sending these e-mails has no idea who you are. If you have no affiliation with the company the e-mail address is supposedly coming from, it's fake. For example, if the e-mail is coming from Wells Fargo bank but you bank at a different bank.
  2. Spelling and grammar - Improper spelling and grammar is almost always a dead give away. Look for obvious errors.
  3. No mention of account information - If the company really was sending you information regarding errors to your account, they would mention your account or username in the e-mail. In the above example the e-mail just says "eBay customer", if this really was eBay they would mention your username.
  4. Deadlines - E-mail requests an immediate response or a specific deadline. For example, in the above example, the requirement to log in and change your account information within 24 hours.
  5. Links - Although many phishing e-mails are getting better at hiding the true URL you are visiting, often these e-mails will list a URL that is not related to the company's URL. For example, in our above eBay example, http://fakeaddress.com/ebay is not an eBay URL, just a URL with an ebay section. If you're unfamiliar with how a URL is structured , see the URL definition for additional information.
What to do if you're not sure if an e-mail is official.
  • Never follow any links in an e-mail you're uncertain about. Instead of following the link in the e-mail, visit the page by manually typing the address of the company. For example, in the above example, instead of visiting the fake ebay URL, you would type: http://www.ebay.com in your web browser and log in through the official website.
  • Never send any personal information through e-mail. If a company is requesting you send them personal information about your account or are saying your account is invalid, visit the web page and log into the account as you normally would.
  • Finally, if you are still not sure about the status of your account or are concerned about your personal information, contact the company directly, either through an e-mail address provided on their website or over the phone.
Issues phishing e-mails commonly address
Below are some of the issues a phishing e-mail may inquire about in order to trick users.
  • Account issues, such as account or password expiring, account being hacked, account out-of-date, or account information needing to be changed.
  • Credit card or other personal information, such as credit card expiring or being stolen, incorrect social security number or other personal information, or duplicate credit card or other personal information
  • Confirming orders, such as request that you log in to confirm recent orders or transactions.
Common companies affected by phishing
Below is a listing of some of the companies phishers often send e-mails about.
  • Any major bank
  • Popular websites such as Amazon, Facebook, MySpace, PayPal, eBay, Microsoft, Apple, Hotmail, YouTube, etc.
  • Government: FBI, CIA, IRS, etc.
  • Internet service providers such as AOL, Comcast, Cox, MSN, etc.
  • Casinos and lottery.
  • Online dating or community websites.

Tuesday, December 6, 2011

SOME LATEST VIRUS NAMES

Name DISCOVERY

Exploit.CVE-2011-3402.Gen 2011 Nov 07
Backdoor.IRCBot.Dorkbot.A 2011 May 15
Backdoor.Lavandos.A 2011 Jan 06
Trojan.Android.Geinimi.A 2011 Jan 03
Java.Trojan.Downloader.OpenConnection. 2010 Nov 12
Java.Backdoor.ReverseBackdoor.A 2010 Nov 12
Win32.Ramnit.G 2010 Oct 28
Trojan.Spy.Ursnif.F 2010 Oct 20
Win32.Worm.Stuxnet.A 2010 Oct 07
Win32.Worm.Prolaco.S 2010 Oct 06
Exploit.CplLnk.Gen 2010 Jul 19
Worm.P2P.Palevo.FP 2010 Jul 09
Win32.Viking.Gen 2010 Jul 07
Win32.Worm.Autorun.UB 2010 Jul 01
Trojan.Spy.ZBot.EPU 2010 Jun 30
Trojan.PWS.OnlineGames.KDLC 2010 Jun 21
Backdoor.MSIL.Bot.A 2010 Jun 14
Backdoor.Bifrose.AAJX 2010 Jun 14
Trojan.Renos.PGZ 2010 Jun 01
Trojan.PWS.OnlineGames.KDKC 2010 May 30

Some More Definitions

Vulnerability scanner

A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)
Rootkit

A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.


Trojan horses

A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)

Friday, March 18, 2011

Stretch The Window Vertically- WINDOWS 7

You can stretch the active window vertically to the maximum display height by pressing the Windows + Shift + Up (arrow) keys. Press Windows + Down Keys if you want to restore it.

Tips & Warnings While HIBERNATING to XP

Simply turn on your computer to exit Hibernation mode.

Make sure you have exited most of your programs so that Windows can exit the Hibernation mode successfully.

If your computer fails to come out of Hibernation, press the Power button for five seconds. That will shut it down. Press it again to restart.

How to Hibernate in Windows XP

1Make sure all necessary programs are closed prior to shutting down. Hibernating will put all programs to "sleep," but some programs won't start up properly. Experiment after this to figure out which programs perform as intended.

2Click on "Start" and navigate to "Shut Down."

3You will see the Shut Down dialog box.

4You will see three options--Standby, Turn Off or Restart.

5Hold down the "Shift" key on your keyboard and "Standby" will switch to "Hibernate."

6Click on "Hibernate" and your system will then go into Hibernation mode. It will take a few seconds to a few minutes to enter that mode, in which case your system will shut down.