Sunday, May 10, 2009

If the computer is Zombie.

The pests lurking on web pages via email or comment. Viruses, trojans and worms to make the network a place where there is no absolute security. Have they only nestled on a computer, they are often difficult to remove.

 


Viruses, trojans, worms - on the Internet many dangers lurking for hard disks and then stored data. Even a firewall and virus scanners do not provide absolute protection against unsolicited intruders in the background all the documentation, which the user is doing, passwords and other secret data spying.


DDP
Alarm in the Inbox folder: Viruses, Trojans, worms for each computer are a hazard


Often the user can see initially not that his computer was infected and a trojan industrious pests nachlade warns Daniel Bach box of the computer magazine "c't". Previously, the infected PCs usually slower. The malware in the background drove her mischief, slow the PC. The computing power of modern computers is so high that hardly any additional programs to be significant. Pests also work very discreetly, to a discovery as long as possible to escape.

Aback one should in any case, if not more important programs to update them and, for example, the virus scanner against an update ruffles. The worm disables the Conficker about access to the homepage of the virus scanner. The conservation program is therefore useless for the user.


Underground economy in the network


Especially dangerous is it if a malicious Trojan horse programs nachlädt until the PC can be completely controlled remotely. Then the computer is mutated to the "Zombie", the uncontrolled send spam, or malware out passwords can spread. Lautenbach field, there is now a veritable industry in the Underground network. Credit card numbers or bank information, the sending of spam - everything has its price fixed.

If such malicious programs once nestled on the hard disk, it is quite difficult, they are completely removed. Virus scanners detect the malware is running, but they can not remove. Even in Safe Mode often recommended is the more difficult.

Field Bach recommends that the computer from the bootable CD of the anti-virus program up. Then start Windows and not the pests can not protect. The manufacturers pay anti-virus programs such CDs in the normal case.

Once the pest has been removed, you should use the virus scanner the system during normal operation can be verified. If the anti-virus program alarm again, there are still residues of malware on the hard disk. Then the risk that pests again loaded on the computer or the PC will continue ausspioniert. Therefore helps in the case of such a serious virus attack usually only one thing: The computer must be re-set the hard drive so reformatting. Non-secure data is then lost.


A new mesh of cyber gangsters


When one of his own e-mail address, spam e-mails gets, it means a long way, not that the PC is part of a Botnet has become known, sent the spam. The address of the sender is usually forged. For those affected, the angry, is finally under his own name sent spam. But you really could do nothing on the other hand, unfortunately, says Bach box. It is almost impossible to understand the real sender to find.

ON THE INTERNET

Secunia

Update-Star

Federal Office for Information Security

Trojan Info

Virus Ticker

Hoax-Info Service

blogs ONLINE is not responsible for the content of external internet sites.

A relatively new mesh of cyber gangsters Scareware is called. To business with the fear of viruses and Trojans to make web pages gaukeln a safety test, which was obviously negative. They offer programs to be paid to the alleged problems. This software is usually completely functionless and the person voted for nothing and nothing is spent dozens warns Bach box.

To be against Internet pests to protect, should work on any PC with Internet a current virus scanner run. Also, the firewall must always remain enabled. All programs should also be on the current date. This is particularly true for the typical gateways for malware such as the browser, the PDF-reading software Adobe Reader, Windows Media Player and Quicktime and Java. During regular update also help free update managers who, for example, under
and secunia.com
updatestar.com in the network. And of course, is: Always keep your eyes open, because the Internet is dangerous for the security of your PC.


OVER-THE WORM: SO MAN PROTECTS AGAINST COMPUTERS CONFICKER


The most important answers at a glance: How Conficker, what you should do, and where can you free tools to remove the malicious software found.

So goes the worm before


The first method of attack targets a vulnerability in Microsoft's server software. Then spread the Downadup also called worm within networks, without the computer users themselves would have something to contribute: The worm tries, with the help of a software administrator passwords to crack. If this succeeds, the worm may be freely disseminated within the network. In a third phase, the worm spreads itself to target mobile devices, for example, via a USB interface with an infected computer system. Additionally, the worm searches through networks to "shared folders and network drives. Calculator, which deals with a network resource to connect, are also affected. The aim of the worm Downadup are especially corporate networks, but also personal computers can be infected.

Windows updates


Since Downadup First, the automatic update features of Windows and antivirus software frozen, you should try to initiate these updates manually. Private users will find the Windows feature that after clicking the Start icon, then under "Help and Support", then "the computer with Windows Update to the latest date."

USB Autorun function


Initially, you should use the autorun feature for USB flash drives off. But this is unfortunately not trivial and requires a change in the registry database: If you are not able to ask someone who really knows so. Improper interference with the registry can affect the functioning of the PC affect sensitive. The autorun function can also temporarily disable a trick: Simply the Shift key and hold, while a USB stick or other removable drive einsteckt. Only after notification of the drive spindle.

Computer with free tools


Who wants to be sure that his computer is clean, can be one of the specialized tools of the IT security companies, or rely on a Linux Live CD. Some companies offer such a thing as an ISO image to download: You can use the downloaded file to a CD. This is bootable and launches a lightweight Linux system with the help of current anti-virus scanning the hard drive of the infected computer, bypassing the operating system are investigated.

FREE Conficker helper


  Heise Security: background for dealing with tools

Microsoft Tutorial: Protect yourself from Conficker

Microsoft helpers: Malicious Software Removal Tool

Symantec instructions: The worm Conficker

  Enigma Software: Conficker-Removal Tool

  Kaspersky Tool: KidoKiller

No comments:

Post a Comment