Archives

4

COMPUTER VIRUSES ???

Matovu George William
CONTENTS
• How to determine whether your computer is infected with a computer virus, a worm, or a trojan
• How to recover from an infection
• How to prevent future infections from a computer virus

What is a computer virus?

A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk.

Computer viruses are most easily spread by attachments in e-mail messages or by instant messaging messages. Therefore, you must never open an e-mail attachment unless you know who sent the message or unless you are expecting the e-mail attachment. Computer viruses can be disguised as attachments of funny images, greeting cards
, or audio and video files. Computer viruses also spread by using downloads on the Internet. Computer viruses can be hidden in pirated software or in other files or programs that you may download.

Symptoms of a computer virus

If you suspect or confirm that your computer is infected with a computer virus, obtain the current antivirus software. The following are some primary indicators that a computer may be infected:

• The computer runs slower than usual.
• The computer stops responding, or it locks up frequently.
• The computer crashes, and then it restarts every few minutes.
• The computer restarts on its own. Additionally, the computer does not run as usual.
• Applications on the computer do not work correctly.
• Disks or disk drives are inaccessible.
• You cannot print items correctly.
• You see unusual error messages.
• You see distorted menus and dialog boxes.
• There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension.
• An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted.
• An antivirus program cannot be installed on the computer, or the antivirus program will not run.
• New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.
• Strange sounds or music plays from the speakers unexpectedly.
• A program disappears from the computer even though you did not intentionally remove the program.

Note : These are common signs of infection. However, these signs may also be caused by hardware or software problems that have nothing to do with a computer virus. Unless you run the Microsoft Malicious Software Removal Tool, and then you install industry-standard, up-to-date antivirus software on your computer, you cannot be certain whether a computer is infected with a computer virus or not.

Symptoms of worms and trojan horse viruses in e-mail messages

When a computer virus infects e-mail messages or infects other files on a computer, you may notice the following symptoms:

• The infected file may make copies of itself. This behavior may use up all the free space on the hard disk.
• A copy of the infected file may be sent to all the addresses in an e-mail address list.
• The computer virus may reformat the hard disk. This behavior will delete files and programs.
• The computer virus may install hidden programs, such as pirated software. This pirated software may then be distributed and sold from the computer.
• The computer virus may reduce security. This could enable intruders to remotely access the computer or the network.
• You receive an e-mail message that has a strange attachment. When you open the attachment, dialog boxes appear, or a sudden degradation in system performance occurs.
• Someone tells you that they have recently received e-mail messages from you that contained attached files that you did not send. The files that are attached to the e-mail messages have extensions such as .exe, .bat, .scr, and .vbs extensions.

Symptoms that may be the result of ordinary Windows functions

A computer virus infection may cause the following problems:

• Windows does not start even though you have not made any system changes or even though you have not installed or removed any programs.
• There is frequent modem activity. If you have an external modem, you may notice the lights blinking frequently when the modem is not being used. You may be unknowingly supplying pirated software.
• Windows does not start because certain important system files are missing. Additionally, you receive an error message that lists the missing files.
• The computer sometimes starts as expected. However, at other times, the computer stops responding before the desktop icons and the taskbar appear.
• The computer runs very slowly. Additionally, the computer takes longer than expected to start.
• You receive out-of-memory error messages even though the computer has sufficient RAM.
• New programs are installed incorrectly.
• Windows spontaneously restarts unexpectedly.
• Programs that used to run stop responding frequently. Even if you remove and reinstall the programs, the issue continues to occur.
• A disk utility such as Scandisk reports multiple serious disk errors.
• A partition disappears.
• The computer always stops responding when you try to use Microsoft Office products.
• You cannot start Windows Task Manager.
• Antivirus software indicates that a computer virus is present.

How to remove a computer virus

Even for an expert, removing a computer virus can be a difficult task without the help of computer virus removal tools. Some computer viruses and other unwanted software, such as spyware, even reinstall themselves after the viruses have been detected and removed. Fortunately, by updating the computer and by using antivirus tools, you can help permanently remove unwanted software.

To remove a computer virus, follow these steps:

1. Install the latest updates from Microsoft Update on the computer.
2. Update the antivirus software on the computer. Then, perform a thorough scan of the computer by using the antivirus software.

How to protect your computer against viruses

To protect your computer against viruses, follow these steps:

1. On the computer, turn on the firewall.
2. Keep the computer operating system up-to-date.
3. Use updated antivirus software on the computer.
4. Use updated antispyware software on the computer.

Types of Computer Viruses

Boot Sector viruses: A boot sector virus infects diskettes and hard drives. All disks and hard drives contain smaller sections called sectors. The first sector is called the boot. The boot carries the Mater Boot Record (MBR). MBR functions to read and load the operating system. So, if a virus infects the boot or MBR of a disk, such as a floppy disk, your hard drive can become infected, if you re-boot your computer while the infected disk is in the drive. Once your hard drive is infected all diskettes that you use in your computer will be infected. Boot sector viruses often spread to other computers by the use of shared infected disks and pirated software applications. The best way to disinfect your computer of the boot sector virus is by using antivirus software.

Program viruses: A program virus becomes active when the program file (usually with extensions .BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is opened. Once active, the virus will make copies of itself and will infect other programs on the computer.

Multipartite viruses: A multipartite virus is a hybrid of a Boot Sector and Program viruses. It infects program files and when the infected program is active it will affect the boot record. So the next time you start up your computer it'll infect your local drive and other programs on your computer.

Stealth viruses:
A stealth virus can disguise itself by using certain tactics to prevent being detected by antivirus software. These tactics include altering its file size, concealing itself in memory, and so on. This type of virus is nothing new, in fact, the first computer virus, dubbed Brain, was a stealth virus. A good antivirus should be able to detect a stealth virus lurking on your hard drive by checking the areas the virus infected and evidence in memory.

Polymorphic viruses:
A polymorphic virus acts like a chameleon, changing its virus signature (also known as binary pattern) every time it multiples and infects a new file. By changing binary patterns, a polymorphic virus becomes hard to detect by an antivirus program.

Macro Viruses:
A macro virus is programmed as a macro embedded in a document. Many applications, such as Microsoft Word and Excel, support macro languages. Once a macro virus gets on to your computer, every document you produce will become infected. This type of virus is relatively new and may slip by your antivirus software if you don't have the most recent version installed on your computer. .

Active X and Java Control:
Some users do not know how to manage and control their web browser to allow or prohibit certain functions to work, such as enabling or disabling sound, pop ups, and so on. Leaving your computer in danger of being targeted by unwanted software or adware floating in cyberspace.
1

2010 BEST 1000 HACKING TUTORIALS

Matovu George William

1

ULTIMATE BLUETOOH MOBILE SPY

Matovu George William
The Best Selling Phone Spy Software in the world!
 
MOBILE PHONE SPYING SOFTWARE
ORIGINALLY DEVELOPED BY E-STEALTH
FOR CLASSIFIED SURVEILLANCE MISSIONS
 
 
0

ALL MOBILE ANTIVIRUS

Matovu George William

IT WORKS ON Nokia, Sony Ericsson 

And 

ALL .Jar Compatible All Phone

 

 

 

29

VIDEO STREAMING PROXIES

Matovu George William
http://wash-hide.tk/
http://secure-tool.tk/
http://hide-security.tk/
http://proxy-lux.co.cc/
http://youtubeunblock.net
http://c-a-r-insurance.co.cc
http://special-hide.tk/
http://youth-hide.tk/
http://clock-hide.tk/
http://nose-hide.tk/
http://cougar-hide.tk/
http://d-e-b-t.co.cc
http://schoolbreaker.co.cc
http://de-bt-free.co.cc
http://l-e-a-d-s-generation.co.cc
http://d-e-b-t-free.co.cc
http://l-o-a-n-s.co.cc
http://celebral-palsy.co.cc
http://home-l-o-a-n.co.cc
http://in-ju-ry-attorney.co.cc
http://mortgage-l-e-a-d-s.co.cc
http://www.bebo-proxy.in/
http://www.schoolbreakforex.co.cc
http://a-c-c-i-d-e-n-t.co.cc
http://jobhide.com
http://forexschoolhiding.co.cc
http://lock-and-hide.co.cc/
http://webshide.com
http://webshide.com
http://equity-l-o-a-n.co.cc
http://a-c-c-i-d-e-n-t.co.tv
http://webshide.com
http://trans-hide.tk/
http://celebralpalsy.co.cc
http://l-a-w-yerhouston.co.cc
http://i-r-s-help.co.cc
http://dallas-la-sik.co.cc
http://chrl.tk
http://evadeunblock.com
http://frozenlava.info
http://bypassunblock.biz
http://www.vivalaproxy.com/
http://dontblockme.net
http://fb-proxy.info
http://goodbyefirewall.com
http://www.proxy-server.in/
http://unblockproxy.in/
http://unblocksites.in/
http://seuxa.info
http://bot-way.tk/
http://hidemaxi.com
http://hidemobile.com
http://silver-hide.tk/
http://www.eloan-prox.co.cc/
http://glype.saintvsinner.com
http://www.sansfiltre.fr
http://stock-hide.co.cc/
http://stock-pass.co.cc/
http://clean-hide.tk/
http://tree-one.tk/
http://lunch-hide.tk/
http://d-e-b-t-consolidation.co.cc
http://electric-tool.tk/
http://fear-clean.tk/
http://www.goldering.com
http://earn-stock.tk/
http://www.studyfromhome.co.cc/
http://listing-hide.tk/
http://million-hide.tk/
http://dark-wet.tk/
http://land-home.tk/
http://our-moments.com
http://turv.info
http://feelfreeforex.co.cc
http://hawsi.com
http://mudgi.info
http://73x.de
http://schoolfakeforex.co.cc
http://www.fake24h.com
http://freeservers.mw/
http://2rs.info
http://www.studentloanbrowser.co.cc
http://browse2forex.co.cc
http://lift-way.tk/
http://burn-bypass.tk/
http://gateway.mw/
http://lite-way.tk/
http://ang-way.tk/
http://clear-hide.tk/
http://ninjahider.info
http://proxywebs.info
http://take-hide.tk/
http://land-sale.tk/
http://student-l-o-a-n.co.cc
http://de-bt-help.co.cc
http://d-e-b-t-solution.co.cc
http://a-u-t-o-insurance.co.cc
http://anonymousforex.co.cc
http://freetravelforex.co.cc
http://majib.info
http://surfinghide.com
http://studentloanbypass.co.cc
http://tele-hide.tk/
http://free2browse.co.cc
http://2010e.info
http://www.newunblocksites.info
http://manil.info
http://retr.info
http://cloakyour.com
http://proxin.us

SURVEY BY; Willsjojo Incorp
0

How to Detect and Control Proxies

Matovu George William
Organizations have implemented firewalls, URL filters, and appropriate network use policies to keep their network safe. Anonymous proxies allow a user to easily bypass these policies, and bypass them while going undetected. In addition there are new anonymous proxies available each and every day making it extremely difficult for an organization to block their access. This creates a security holes allowing the potential for malicious or illegal content as well as opening up an opportunity for a user to access improper, banned, or illegal sites/resources/applications that may degrade the performance of the network and critical applications. As an organization plugs one hole a new one becomes available.
There are serious implications for an organization:
Compliance breaches that exposes an organization to regulatory or legal consequences
Security holes that expose the network to malware, Trojans, or other threats
Increased costs through unwanted bandwidth usage
Performance issues that lead to diminished employee productivity, increases costs and lowers profit
Potential for organizational reputation damage that could be very difficult and costly to repair To effectively manage anonymous proxies, organizations need to:
Be able to detect an anonymous proxy
Leverage application signatures to categorize network traffic
Implement network usage policies to shape traffic Introduction
In computer networks, a proxy server is a server or an application that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server provides the resource by connecting to the relevant server and requesting the service on behalf of the client. Most proxy programs provide a means to deny access to URLs specified in a blacklist, thus providing content filtering. This is often used in a corporate, educational or library environment, and anywhere else where content filtering is desired.

Proxy Server Uses
A proxy server has many potential purposes:
 Proxy Server Uses
A proxy server has many potential purposes:

  1. To circumvent organizational restrictions and controls
  2. To speed up access to network resources
  3. To cache web pages from a web server
  4. To apply access policy to network services or content, e.g. to block undesired sites
  5. To log /audit usage, i.e. to provide company employee Internet usage reporting
  6. To scan transmitted content for malware or Trojans before delivery
  7. To scan outbound content, for data leak protection
  8. To keep machines behind it anonymous (mainly for security)
Anonymous Proxy Servers
An anonymous proxy server attempts to conceal a user’s identity. One of the more common approaches is the open proxy. Being very difficult to track, open proxies are especially useful to those seeking online anonymity, from political dissidents to grade school and university students to computer criminals. Some users are merely interested in anonymity for added security, hiding their identities from potentially malicious websites for instance. The server receives requests from the anonymizing proxy server, and thus does not receive information about the “true” end user's IP address.

Why do users run an anonymous proxy?
Many anonymous proxy servers are funded through advertising. A site for example, could allow access to MySpace using HTTPs. The ad is displayed to the user and cannot be removed unless the user subscribes.

The challenge is that there are thousands of anonymous proxies on the internet so blocking access to the proxy is very difficult. New ones are available each day. Users can use these to circumvent the security measures put in place to control or restrict access.

Impact to the Organization
As an organization plugs one hole a new one becomes available and allows the user to circumvent the security measures once again. This means that the organization simply cannot stop a savvy user from bypassing the rules in place to access restricted websites or applications. This becomes a time consuming and constant burden on the IT organization. This creates a back door into the network. Not all anonymous proxy owners are hosting ad space to fund the service. Many have different motives that might have much greater implications on an organization.

There are also many different kinds of anonymizers. A tunneling proxy server is a web-based page that takes a site that is blocked and "tunnels" it, allowing the user to view blocked pages. This effectively implements a bypass for the user allowing them to access sites that are blocked. Others may perform encryption or encapsulation or other means to avoid detection and allow a user continued access to restricted sites or even applications.
This makes it even more difficult for an organization to maintain acceptable use policies and manage the network bandwidth; all leading to potential security breaches and inability to ensure that the network is available for critical applications.

Organizations need help!
There are also applications designed for bypassing an organizations firewall or filtering rules. Your Freedom is a client application that turns any PC into an uncensored, anonymous web and anonymous SOCKS proxy that applications can use. Nearly all applications work with Your Freedom. This is a huge security hole for an organization because it not only allows a user or employee to bypass security measures it also allows an open door into the network for others.

Beware of the following Services
1. Vtunnel is a tunneling proxy service. By browsing the web through the vtunnel service many blocked websites can be accessed by users. Vtunnel provides the service completely free of charge due to advertiser support.
2. StealthNet is an application that allows anonymous file sharing. This can allow a backdoor into the network or allow an organizations intellectual property to be easily moved outside their network – credit cards names and numbers, social security information of employees, student information etc.
3. The VoipTunnel technology has been developed by VoipSwitch in order to enable making and receiving VoIP calls for users who are behind firewalls that block Voip traffic. This can also expose an organizations users, network and machines the outside threats or holes in security measures.

Why should you care?
Organizations have implemented firewalls, URL filters, and appropriate network use policies to keep their network safe. Anonymous proxies allow a user to easily bypass these policies, and bypass them while going undetected. In addition there are new anonymous proxies available each and every day making it extremely difficult for an organization to block their access. This creates a security hole allowing the potential for malicious or illegal content as well as opening up an opportunity for a user to access improper, banned, or illegal sites/resources/applications that may degrade the performance of the network and critical applications.

This increases the risks to employees, students, and organizational networks. Hackers often provide anonymous proxies to inject a backdoor into the network.

Serious Implications for the Organization
  1. Compliance breaches that exposes an organization to regulatory or legal consequences
  2. Security holes that expose the network to malware, Trojans, or other threats
  3. Increased costs through unwanted bandwidth usage
  4. Performance issues that lead to diminished employee productivity, increases costs and lowers profit
  5. Potential for organizational reputation damage that could be very difficult and costly to repair
In Summary
Anonymous Proxy services have taken security avoidance technology to the next level employing a combination of techniques. Constantly changing IP Addresses (an Anonymous Proxy site may come online one hour and be gone the other). Tunnelling through http can hide the legitimate traffic inside the ‘legitimate’ looking http tunnel. Encryption – utilizing https (SSL encryption) removes the ability for traditional filtering solutions to look ‘inside’ the packets.

Exinda appliances perform anonymous proxy detection by URL, IP, domain, HTTPs and SSL application signatures. This is integrated via an update service that regularly distributes new anonymous proxy information and signatures to a device to allow an organization visibility and control of this traffic on the network. By creating policies an organization can squeeze this traffic or completely block it altogether.
0

PERSONALIZE WINDOWS XP START BUTTON TO YOUR NAME

Matovu George William
You will at first download Resource hacker.
Resource Hacker is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000 and WinXP operating systems.Its just 541Kb in the size. NOW LETS START

STEP1;
 Make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe
The category we are going to be using is String Table In Resource Hacker. Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable as shown in Fig. 02. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.
There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry


STEP 2;
Modify the Registry Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open: field. Navigate to:
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon

the Right pane (Fig. 05), double click the Shell entry to open the Edit String dialog box as shown in Fig. 06. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.

Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.


ENJOY , YOU CAN AS WELL JOIN ME HERE FOR MORE KNOWLEDGE 
 
Copyright 2016 Strictly Technology
Strictly Technology Blog Theme by Wills Jojo Senior